Submit a ticketCall us

Looking to compare latest NPM features with previous versions of NPM?
The NPM new feature summary offers a comparison of new features and improvements offered with this release.

 

 

 

 

Home > Success Center > Network Performance Monitor (NPM) > Remote Code Execution Vulnerability detected in Pepco32c.ocx

Remote Code Execution Vulnerability detected in Pepco32c.ocx

Created by Chris Foley, last modified by MindTouch on Jun 23, 2016

Views: 729 Votes: 0 Revisions: 4

Overview

This article discusses the SAM Pepco32c.ocx Remote Code Execution vulnerability and describes how to address this vulnerability.

Environment

  • SAM 6.0
  • NPM 10.6

Cause 

Pepco32c.ocx is a third-party application previously used to build pie charts within Orion. The vulnerability exists due to insufficient bound checks on user-supplied input by the affected software. An attacker could exploit this vulnerability to execute arbitrary code in the context of the application using the ActiveX control Pepco32c.ocx. An exploit could allow an attacker to execute arbitrary code or cause a denial of service (DoS) condition.

Resolution

The security vulnerability is known to be fixed in the following applications versions as the third-party application is longer used:

  • NPM 10.6.1
  • SAM 6.0.2

To fix the issue, upgrade to these versions or higher.

Note: If you are already running version higher than these versions, delete the following file as it is no longer required:

C:\Program Files\Common Files\SolarWinds\Pepco32c.ocx

 

 

Last modified
23:25, 22 Jun 2016

Tags

Classifications

Public