CVE-2007-1972
BMC Performance Manager SNMP Command Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
PatrolAgent.exe in BMC Performance Manager does not require authentication for requests to modify configuration files, which allows remote attackers to execute arbitrary code via a request on TCP port 3181 for modification of the masterAgentName and masterAgentStartLine SNMP parameters. NOTE: the vendor disputes this vulnerability, stating that it does not exist when the system is properly configured
** IMPUGNADO ** PatrolAgent.exe en BMC Performance Manager no requiere validación para respuestas de modificación de archivos, lo cual permite a atacantes remotos ejecutar código de su elección a través de respuestas sobre TCP puerto 3181 para la modificación de los parámetros masterAgentName ymasterAgentStartLine SNMP. NOTA: el vendedor impugna esta vulnerabilidad, basándose en que esta no existe cuando el sistema está configurado adecuadamente.
These vulnerabilities allows attackers to execute arbitrary code on vulnerable installations of BMC Performance Manager. User interaction is not required to exploit this vulnerability.
The specific flaw exists in the PatrolAgent.exe listening on TCP port 3181. The service allows remote attackers to modify configuration files without authentication. This can be exploited by an attacker by modifying parameters in SNMP communities definitions. By modifying the masterAgentName and masterAgentStartLine parameters, an attacker can execute arbitrary code.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2007-04-11 CVE Reserved
- 2007-04-18 CVE Published
- 2024-01-17 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (7)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/2599 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/466223/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/466274/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/23559 | Vdb Entry | |
http://www.securitytracker.com/id?1017935 | Vdb Entry | |
http://www.vupen.com/english/advisories/2007/1458 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
http://www.zerodayinitiative.com/advisories/ZDI-07-020.html | 2024-05-17 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Bmc Search vendor "Bmc" | Performance Manager Search vendor "Bmc" for product "Performance Manager" | * | - |
Affected
|