Show filters
24 Total Results
Displaying 11-20 of 24
Sort by:
Attacker Value
Unknown
CVE-2018-20735
Disclosure Date: January 17, 2019 (last updated November 08, 2023)
An issue was discovered in BMC PATROL Agent through 11.3.01. It was found that the PatrolCli application can allow for lateral movement and escalation of privilege inside a Windows Active Directory environment. It was found that by default the PatrolCli / PATROL Agent application only verifies if the password provided for the given username is correct; it does not verify the permissions of the user on the network. This means if you have PATROL Agent installed on a high value target (domain controller), you can use a low privileged domain user to authenticate with PatrolCli and then connect to the domain controller and run commands as SYSTEM. This means any user on a domain can escalate to domain admin through PATROL Agent. NOTE: the vendor disputes this because they believe it is adequate to prevent this escalation by means of a custom, non-default configuration
0
Attacker Value
Unknown
CVE-2017-13130
Disclosure Date: August 23, 2017 (last updated November 26, 2024)
mcmnm in BMC Patrol allows local users to gain privileges via a crafted libmcmclnx.so file in the current working directory, because it is setuid root and the RPATH variable begins with the .: substring.
0
Attacker Value
Unknown
CVE-2016-9638
Disclosure Date: December 02, 2016 (last updated November 25, 2024)
In BMC Patrol before 9.13.10.02, the binary "listguests64" is configured with the setuid bit. However, when executing it, it will look for a binary named "virsh" using the PATH environment variable. The "listguests64" program will then run "virsh" using root privileges. This allows local users to elevate their privileges to root.
0
Attacker Value
Unknown
CVE-2009-4225
Disclosure Date: December 08, 2009 (last updated October 04, 2023)
Stack-based buffer overflow in the PestPatrol ActiveX control (ppctl.dll) 5.6.7.9 in CA eTrust PestPatrol allows remote attackers to execute arbitrary code via a long argument to the Initialize method.
0
Attacker Value
Unknown
CVE-2008-5982
Disclosure Date: January 27, 2009 (last updated October 04, 2023)
Format string vulnerability in BMC PATROL Agent before 3.7.30 allows remote attackers to execute arbitrary code via format string specifiers in an invalid version number to TCP port 3181, which are not properly handled when writing a log message.
0
Attacker Value
Unknown
CVE-2007-2522
Disclosure Date: May 11, 2007 (last updated October 04, 2023)
Stack-based buffer overflow in the inoweb Console Server in CA Anti-Virus for the Enterprise r8, Threat Manager r8, Anti-Spyware for the Enterprise r8, and Protection Suites r3 allows remote attackers to execute arbitrary code via a long (1) username or (2) password.
0
Attacker Value
Unknown
CVE-2007-2136
Disclosure Date: April 22, 2007 (last updated October 04, 2023)
Stack-based buffer overflow in bgs_sdservice.exe in BMC Patrol PerformAgent allows remote attackers to execute arbitrary code by connecting to TCP port 10128 and sending certain XDR data, which is not properly parsed.
0
Attacker Value
Unknown
CVE-2006-3223
Disclosure Date: June 27, 2006 (last updated October 04, 2023)
Format string vulnerability in CA Integrated Threat Management (ITM), eTrust Antivirus (eAV), and eTrust PestPatrol (ePP) r8 allows attackers to cause a denial of service (crash) and possibly execute arbitrary code via a scan job with format strings in the description field.
0
Attacker Value
Unknown
CVE-2000-1173
Disclosure Date: January 09, 2001 (last updated February 22, 2025)
Microsys CyberPatrol uses weak encryption (trivial encoding) for credit card numbers and uses no encryption for the remainder of the information during registration, which could allow attackers to sniff network traffic and obtain this sensitive information.
0
Attacker Value
Unknown
CVE-1999-1460
Disclosure Date: July 13, 1999 (last updated February 22, 2025)
BMC PATROL SNMP Agent before 3.2.07 allows local users to create arbitrary world-writeable files as root by specifying the target file as the second argument to the snmpmagt program.
0