Vulnerability: SGI pmpost

According to an alert from SGI, the Performance Co-Pilot /usr/pcp/bin/pmpost utility can be manipulated by a malicious user to append to critical system files. This capability could be used to cause a root exploit. For more, clicke here

Join the newsletter!

Or

Sign up to gain exclusive access to email subscriptions, event invitations, competitions, giveaways, and much more.

Membership is free, and your security and privacy remain protected. View our privacy policy before signing up.

Error: Please check your email address.

More about SGI Australia

Show Comments