Wyse Thin Client hagent.exe Unspecified Buffer Overflow

critical Nessus Plugin ID 40862

Synopsis

Arbitrary code can be executed on the remote host.

Description

The version of the Wyse Thin Client HAgent service installed on the remote host is at risk of a remote buffer overflow attack.

An unauthenticated attacker can exploit this flaw by sending a specially crafted packet to the remote host. Successful exploitation would result in remote code execution with the privileges of the service itself.

Solution

Upgrade to the latest version of Wyse Device Manager (4.7.2) and apply the two security updates (HF 04072019009 and HF04072019709).

See Also

https://www.theregister.co.uk/2009/07/10/wyse_remote_exploit_bugs/

http://www.nessus.org/u?448a7933

Plugin Details

Severity: Critical

ID: 40862

File Name: wyse_hagent.nbin

Version: 1.71

Type: remote

Published: 9/2/2009

Updated: 3/19/2024

Supported Sensors: Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 7/10/2009

Vulnerability Publication Date: 7/10/2009

Exploitable With

Metasploit (Wyse Rapport Hagent Fake Hserver Command Execution)

Reference Information

BID: 35650

Secunia: 35794