Submit a ticketCall us

Webinar: Web Help Desk for HR, Facilities and Accounting Departments
This webinar will focus on use cases for HR, Facilities and Accounting.

Having a unified ticketing and asset management system for all the departments in your company can provide end-users with a seamless experience and make things easier for your IT team. Yet, with different business tasks and objectives, many departments don’t fully understand the capabilities of Web Help Desk and how the software can be customized for effective use in their departments.
Register Now.

Home > Success Center > Network Performance Monitor (NPM) > Remote Code Execution Vulnerability detected in Pepco32c.ocx

Remote Code Execution Vulnerability detected in Pepco32c.ocx

Created by Chris Foley, last modified by MindTouch on Jun 23, 2016

Views: 23 Votes: 0 Revisions: 4

Overview

This article discusses the SAM Pepco32c.ocx Remote Code Execution vulnerability and describes how to address this vulnerability.

Environment

  • SAM 6.0
  • NPM 10.6

Cause 

Pepco32c.ocx is a third-party application previously used to build pie charts within Orion. The vulnerability exists due to insufficient bound checks on user-supplied input by the affected software. An attacker could exploit this vulnerability to execute arbitrary code in the context of the application using the ActiveX control Pepco32c.ocx. An exploit could allow an attacker to execute arbitrary code or cause a denial of service (DoS) condition.

Resolution

The security vulnerability is known to be fixed in the following applications versions as the third-party application is longer used:

  • NPM 10.6.1
  • SAM 6.0.2

To fix the issue, upgrade to these versions or higher.

Note: If you are already running version higher than these versions, delete the following file as it is no longer required:

C:\Program Files\Common Files\SolarWinds\Pepco32c.ocx

 

 

Last modified
23:25, 22 Jun 2016

Tags

Classifications

Public