Lucene search

K
saintSAINT CorporationSAINT:7649972CC3AFFE38FDAAAE1E905D1611
HistoryFeb 25, 2015 - 12:00 a.m.

Radia Client Automation radexecd.exe command injection

2015-02-2500:00:00
SAINT Corporation
my.saintcorporation.com
48

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.947 High

EPSS

Percentile

99.2%

Added: 02/25/2015
CVE: CVE-2015-1497
BID: 72612
OSVDB: 118382

Background

Radia Client Automation is an endpoint management solution.

Problem

The **radexecd.exe** daemon does not properly authenticate or sanitize user requests, allowing remote attackers to execute arbitrary commands.

Resolution

Use the workarounds described in the Accelerite announcement.

References

<http://www.zerodayinitiative.com/advisories/ZDI-15-038/&gt;

Limitations

Exploit works on Radia Client Automation 9.00 on CentOS 5.

Platforms

Linux

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.947 High

EPSS

Percentile

99.2%