Persistent Systems Radia Client Automation Agent Stack Overflow Remote Code Execution (destructive check)

Critical Nessus Plugin ID 86251

Synopsis

The Persistent Systems Radia Client Automation agent listening on the remote port is affected by a remote code execution vulnerability.

Description

The Persistent Systems Radia Client Automation (formerly HP Client Automation) agent listening on the remote port is affected by a remote code execution vulnerability due to a stack overflow condition in the radexecd service. An unauthenticated, remote attacker can exploit this to execute arbitrary code with SYSTEM privileges.

Solution

See the vendor advisory for a possible solution.

See Also

http://www.nessus.org/u?ce7789b9

https://www.zerodayinitiative.com/advisories/ZDI-15-363/

Plugin Details

Severity: Critical

ID: 86251

File Name: radexecd_stack_overflow.nasl

Version: 1.6

Type: remote

Published: 2015/10/02

Updated: 2018/11/15

Dependencies: 27627, 11936

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:persistent_systems:radia_client_automation, cpe:/a:hp:client_automation_enterprise

Required KB Items: Services/radexecd

Vulnerability Publication Date: 2015/07/20