Lucene search

K
saintSAINT CorporationSAINT:9E43F4058489D83CC8BE67D9B86D242E
HistoryFeb 25, 2015 - 12:00 a.m.

Radia Client Automation radexecd.exe command injection

2015-02-2500:00:00
SAINT Corporation
download.saintcorporation.com
70

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.956 High

EPSS

Percentile

99.2%

Added: 02/25/2015
CVE: CVE-2015-1497
BID: 72612
OSVDB: 118382

Background

Radia Client Automation is an endpoint management solution.

Problem

The **radexecd.exe** daemon does not properly authenticate or sanitize user requests, allowing remote attackers to execute arbitrary commands.

Resolution

Use the workarounds described in the Accelerite announcement.

References

<http://www.zerodayinitiative.com/advisories/ZDI-15-038/&gt;

Limitations

Exploit works on Radia Client Automation 9.00 on CentOS 5.

Platforms

Linux

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.956 High

EPSS

Percentile

99.2%