CVE-2012-3278
Published Jan 25, 2013
Last updated 5 years ago
Overview
- Description
- Stack-based buffer overflow in magentservice.exe in HP Diagnostics Server 8.x through 8.07 and 9.x through 9.21 allows remote attackers to execute arbitrary code via a malformed message packet.
- Source
- hp-security-alert@hp.com
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:diagnostics_server:8.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F9AEF032-3152-4028-ABE5-8AFD364B3FFB" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:8.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4F487D9-5E03-4EC3-9408-AFE82EB9C5FB" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:8.02:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EE3B487B-2DC3-4488-82E9-2CC6EE81A8BC" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:8.03:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "813BD504-5B46-48D2-8408-43FBDA5E44D4" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:8.04:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0E121939-EC5F-440D-89B8-DB0B9566ABE9" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:8.05:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "655C5E3F-0FE1-4592-942D-7F6D9CC61941" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:8.06:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1E782843-B544-426E-8ED3-F9A20B468AD1" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:8.07:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20737E77-CE62-4A32-B1F0-2103B4972489" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:diagnostics_server:9.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDE932E1-91D2-4301-92F9-A4EE0F1C2912" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:9.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B936B72-FA42-4B83-B803-9FB49BAB53EC" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:9.02:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5BF4099D-B68F-4550-9026-ECB02222F639" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:9.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B1B860DA-0D23-4853-ADF3-22B89EC683DF" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:9.12:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50D8D7C1-0B38-4E52-80FF-89235D16A759" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:9.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "66AB2535-65D7-4D30-953E-9A6AFF4DF090" }, { "criteria": "cpe:2.3:a:hp:diagnostics_server:9.21:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BABA9F98-23EC-485A-A359-B31A3ED9B4DE" } ], "operator": "OR" } ] } ]