BMC Patrol PerformAgent bgs_sdservice Memory Corruption Vulnerability

ID ZDI-07-019
Type zdi
Reporter Anonymous
Modified 2007-11-09T00:00:00


This vulnerability allows attackers to execute arbitrary code on vulnerable installations of BMC Patrol. User interaction is not required to exploit this vulnerability.

The specific flaw exists due to improper parsing of XDR data sent to the bgs_sdservice.exe process listening by default on TCP port 10128. An attacker can influence a parameter to a memory copy operation and cause corruption of the stack and including SEH pointers. This can be leveraged to execute arbitrary code.