Sgi

Performance Co-pilot

7 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
  • EPSS 0.02%
  • Veröffentlicht 28.02.2024 15:15:07
  • Zuletzt bearbeitet 01.04.2025 15:34:51

A vulnerability has been identified in the Performance Co-Pilot (PCP) package, stemming from the mixed privilege levels utilized by systemd services associated with PCP. While certain services operate within the confines of limited PCP user/group pri...

  • EPSS 0.14%
  • Veröffentlicht 29.11.2012 13:14:37
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The (1) pcmd and (2) pmlogger init scripts in Performance Co-Pilot (PCP) before 3.6.10 allow local users to overwrite arbitrary files via a symlink attack on a /var/tmp/##### temporary file.

  • EPSS 6.05%
  • Veröffentlicht 27.08.2012 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

libpcp in Performance Co-Pilot (PCP) before 3.6.5 allows remote attackers to cause a denial of service and possibly execute arbitrary code via (1) a PDU with the numcreds field value greater than the number of actual elements to the __pmDecodeCreds f...

  • EPSS 1.4%
  • Veröffentlicht 27.08.2012 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Performance Co-Pilot (PCP) before 3.6.5 exports some of the /proc file system, which allows attackers to obtain sensitive information such as proc/pid/maps and command line arguments.

  • EPSS 3.5%
  • Veröffentlicht 27.08.2012 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

Multiple memory leaks in Performance Co-Pilot (PCP) before 3.6.5 allow remote attackers to cause a denial of service (memory consumption or daemon crash) via a large number of PDUs with (1) a crafted context number to the DoFetch function in pmcd/src...

  • EPSS 2.46%
  • Veröffentlicht 27.08.2012 23:55:02
  • Zuletzt bearbeitet 11.04.2025 00:51:21

The pduread function in pdu.c in libpcp in Performance Co-Pilot (PCP) before 3.6.5 does not properly time out connections, which allows remote attackers to cause a denial of service (pmcd hang) by sending individual bytes of a PDU separately, related...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 06.12.2001 05:00:00
  • Zuletzt bearbeitet 03.04.2025 01:03:51

The pmpost program in Performance Co-Pilot (PCP) before 2.2.1-3 allows a local user to gain privileges via a symlink attack on the NOTICES file in the PCP log directory (PCP_LOG_DIR).