Show plain JSON{"id": "CVE-2011-0975", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-02-10T18:00:59.177", "references": [{"url": "http://osvdb.org/70788", "source": "cve@mitre.org"}, {"url": "http://secunia.com/advisories/43177", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/8076", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/archive/1/516188/100/0/threaded", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/46151", "source": "cve@mitre.org"}, {"url": "http://www.vupen.com/english/advisories/2011/0286", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-039", "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65135", "source": "cve@mitre.org"}, {"url": "http://osvdb.org/70788", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://secunia.com/advisories/43177", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securityreason.com/securityalert/8076", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/516188/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/46151", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.vupen.com/english/advisories/2011/0286", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-039", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/65135", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Stack-based buffer overflow in BMC PATROL Agent Service Daemon for in Performance Analysis for Servers, Performance Assurance for Servers, and Performance Assurance for Virtual Servers 7.4.00 through 7.5.10; Performance Analyzer and Performance Predictor for Servers 7.4.00 through 7.5.10; and Capacity Management Essentials 1.2.00 (7.4.15) allows remote attackers to execute arbitrary code via a crafted length value in a BGS_MULTIPLE_READS command to TCP port 6768."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en BMC PATROL Agent Service Daemon para Servers, Performance Assurance para Servers, Performance Assurance para Virtual Servers desde v7.4.00 hasta v7.5.10; Performance Analyzer y Performance Predictor para Servers desde v7.4.00 hasta v7.5.10; y Capacity Management Essentials v1.2.00 (v7.4.15) permite a atacantes remotos ejecutar c\u00f3digo arbitrario manipulando la longitud de un valor en un comando BGS_MULTIPLE_READS para el puerto 6768 TCP."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bmc:performance_analysis_for_servers:7.4.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2B422BE5-4ACE-4674-ADD0-AFB50706ACC9"}, {"criteria": "cpe:2.3:a:bmc:performance_analysis_for_servers:7.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "930A4995-F9CD-4975-8DF1-1A4FC5917262"}, {"criteria": "cpe:2.3:a:bmc:performance_analysis_for_servers:7.4.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D0A7699-FC89-4763-972B-B8069BC7B5ED"}, {"criteria": "cpe:2.3:a:bmc:performance_analysis_for_servers:7.5.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2BCFBBF0-486F-463B-80DF-BE5DC586EFAD"}, {"criteria": "cpe:2.3:a:bmc:performance_analysis_for_servers:7.5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FCB969B-774A-4498-A428-AA01D1C24348"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bmc:performance_assurance_for_servers:7.4.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "25A2C5D0-03CD-4FA7-A385-116FF699BAC5"}, {"criteria": "cpe:2.3:a:bmc:performance_assurance_for_servers:7.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "21791D02-2722-4503-A1D7-D357019299B9"}, {"criteria": "cpe:2.3:a:bmc:performance_assurance_for_servers:7.4.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "541C07AB-BFA3-4184-AE49-9758CF4D249B"}, {"criteria": "cpe:2.3:a:bmc:performance_assurance_for_servers:7.5.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E1D569E6-3D56-4DA6-8E9C-5EFC98D2F770"}, {"criteria": "cpe:2.3:a:bmc:performance_assurance_for_servers:7.5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1DAE0145-BA65-4C1A-85D1-F2EA31F96DFD"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bmc:performance_assurance_for_virtual_servers:7.4.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C0C53FC8-4544-4D55-9860-C43EE4BB8BE0"}, {"criteria": "cpe:2.3:a:bmc:performance_assurance_for_virtual_servers:7.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1B759720-4180-4676-93A0-26546171B198"}, {"criteria": "cpe:2.3:a:bmc:performance_assurance_for_virtual_servers:7.4.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8A36225B-0C26-4397-B196-B8C482132912"}, {"criteria": "cpe:2.3:a:bmc:performance_assurance_for_virtual_servers:7.5.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A45A8BE9-3DEA-44DE-A9FE-C01BC6E709C4"}, {"criteria": "cpe:2.3:a:bmc:performance_assurance_for_virtual_servers:7.5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1ED998E2-951D-4F44-8EBB-ACF55FEE40C5"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bmc:performance_analyzer_for_servers:7.4.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A298EE49-1BA1-4B9F-A1FF-63CE8F04C53F"}, {"criteria": "cpe:2.3:a:bmc:performance_analyzer_for_servers:7.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12078E14-6C7E-4421-B354-E7C7493E8CF0"}, {"criteria": "cpe:2.3:a:bmc:performance_analyzer_for_servers:7.4.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE48A1B0-2CD9-44CE-A1D0-3C8A1904DD26"}, {"criteria": "cpe:2.3:a:bmc:performance_analyzer_for_servers:7.5.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "142D71CC-624A-45F1-B5F7-81E81B98BF88"}, {"criteria": "cpe:2.3:a:bmc:performance_analyzer_for_servers:7.5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86B1B81A-9EDC-498F-BC2E-3CC363F18CDF"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bmc:performance_predictor_for_servers:7.4.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D0A9A864-A622-4B7B-9EE7-0A8BC01AEF55"}, {"criteria": "cpe:2.3:a:bmc:performance_predictor_for_servers:7.4.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "669458F8-5646-42EB-9FDC-3AC8EAF4CA4A"}, {"criteria": "cpe:2.3:a:bmc:performance_predictor_for_servers:7.4.15:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFFA35D9-A3A9-4827-AC14-3CF55AE24A8B"}, {"criteria": "cpe:2.3:a:bmc:performance_predictor_for_servers:7.5.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "816ECAF2-4702-49C7-A6C0-7453669F4FFF"}, {"criteria": "cpe:2.3:a:bmc:performance_predictor_for_servers:7.5.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "76342206-796D-4BCE-856B-FC2112A0EC00"}], "operator": "OR"}]}, {"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:bmc:capacity_management_essentials:1.2.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50B5CDA8-B399-4CDE-98F2-4EE4A0D704EC"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}