Persistent Systems Radia Client Automation Agent Stack Overflow Remote Code Execution (destructive check)

Critical Nessus Plugin ID 86251

Synopsis

The Persistent Systems Radia Client Automation agent listening on the remote port is affected by a remote code execution vulnerability.

Description

The Persistent Systems Radia Client Automation (formerly HP Client Automation) agent listening on the remote port is affected by a remote code execution vulnerability due to a stack overflow condition in the radexecd service. An unauthenticated, remote attacker can exploit this to execute arbitrary code with SYSTEM privileges.

Solution

See the vendor advisory for a possible solution.

See Also

http://www.nessus.org/u?ce7789b9

http://www.zerodayinitiative.com/advisories/ZDI-15-363

Plugin Details

Severity: Critical

ID: 86251

File Name: radexecd_stack_overflow.nasl

Version: $Revision: 1.3 $

Type: remote

Published: 2015/10/02

Modified: 2015/10/19

Dependencies: 11936, 27627

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 10

Temporal Score: 8.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:U/RC:C

Vulnerability Information

CPE: cpe:/a:persistent_systems:radia_client_automation, cpe:/a:hp:client_automation_enterprise

Required KB Items: Services/radexecd

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2015/07/20