{"vuid":"VU#966927","idnumber":"966927","name":"HP Client Automation and Radia Client Automation is vulnerable to remote code execution","keywords":["radia","hp","zdi"],"overview":"Radia Client Automation (previously sold under the name HP Client Automation) agent prior to version 9.1  is vulnerable to arbitrary remote code execution.","clean_desc":"According to ZDI's advisory for ZDI-15-363, which has been assigned CVE-2015-7860: \"This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Client Automation. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Hewlett-Packard Client Automation agent. An attacker can send a large buffer of data to the agent which will cause a stack buffer overflow. An attacker can leverage this vulnerability to execute code under the context of the SYSTEM.\"\nAccording to ZDI's advisory for ZDI-15-364, which has been assigned CVE-2015-7861: \"This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Hewlett-Packard Client Automation. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Hewlett-Packard Client Automation agent. An attacker can send arbitrary commands to the agent. An attacker can leverage this vulnerability to execute code under the context of the SYSTEM.\"\nThese vulnerabilities impact the Role-Based Access and Remote Notify features of HP Client Automation. Since 2013, the HP Client Automation software is now developed by Persistent Systems (and its subsidiary Accelerite) under the name Radia Client Automation.","impact":"An unauthenticated remote attacker may be able to execute arbitrary code with SYSTEM privileges.","resolution":"Apply an update Accelerite previously released a hotfix and advisory for this issue in previous versions of HP Client Automation and Radia Client Automation. Affected users may contact Accelerite for hotfix information. Persistent has addressed the issues in the latest build of Radia Client Automation version 9.1. Affected users are encouraged to update as soon as possible.","workarounds":"","sysaffected":"","thanks":"","author":"This document was written by Garret Wassermann.","public":["https://support.accelerite.com/hc/en-us/articles/203659814-Accelerite-releases-solutions-and-best-practices-to-enhance-the-security-for-RBAC-and-Remote-Notify-features","http://www.persistent.com/Persistent-IP/Radia-Client-Automation","https://support.accelerite.com/hc/en-us/articles/203659824","http://www.zerodayinitiative.com/advisories/ZDI-15-363/","http://www.zerodayinitiative.com/advisories/ZDI-15-364/"],"cveids":["CVE-2015-7860","CVE-2015-7861"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2015-10-02T18:59:50Z","publicdate":"2015-07-20T00:00:00Z","datefirstpublished":"2015-10-20T21:34:36Z","dateupdated":"2017-08-14T09:27:43Z","revision":33,"vrda_d1_directreport":"1","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"0","cam_exploitation":"0","cam_internetinfrastructure":"0","cam_population":"0","cam_impact":"0","cam_easeofexploitation":"0","cam_attackeraccessrequired":"0","cam_scorecurrent":"0","cam_scorecurrentwidelyknown":"0","cam_scorecurrentwidelyknownexploited":"0","ipprotocol":"","cvss_accessvector":"N","cvss_accesscomplexity":"L","cvss_authentication":null,"cvss_confidentialityimpact":"C","cvss_integrityimpact":"C","cvss_availabilityimpact":"C","cvss_exploitablity":null,"cvss_remediationlevel":"OF","cvss_reportconfidence":"C","cvss_collateraldamagepotential":"ND","cvss_targetdistribution":"M","cvss_securityrequirementscr":"ND","cvss_securityrequirementsir":"ND","cvss_securityrequirementsar":"ND","cvss_basescore":"10","cvss_basevector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","cvss_temporalscore":"7.8","cvss_environmentalscore":"5.86926702432","cvss_environmentalvector":"CDP:ND/TD:M/CR:ND/IR:ND/AR:ND","metric":0.0,"vulnote":null}