Bmc

Patrol

3 Schwachstellen gefunden.

Hinweis: Diese Liste kann unvollständig sein. Daten werden ohne Gewähr im Ursprungsformat bereitgestellt.
Exploit
  • EPSS 0.19%
  • Veröffentlicht 31.05.2023 20:15:10
  • Zuletzt bearbeitet 08.01.2025 22:15:28

An issue was discovered in BMC Patrol before 22.1.00. The agent's configuration can be remotely queried. This configuration contains the Patrol account password, encrypted with a default AES key. This account can then be used to achieve remote code e...

Exploit
  • EPSS 0.24%
  • Veröffentlicht 23.08.2017 00:29:00
  • Zuletzt bearbeitet 20.04.2025 01:37:25

mcmnm in BMC Patrol allows local users to gain privileges via a crafted libmcmclnx.so file in the current working directory, because it is setuid root and the RPATH variable begins with the .: substring.

Exploit
  • EPSS 0.05%
  • Veröffentlicht 02.12.2016 17:59:00
  • Zuletzt bearbeitet 12.04.2025 10:46:40

In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" us...