{ "id": "CVE-2015-7860", "sourceIdentifier": "cve@mitre.org", "published": "2015-10-19T18:59:06.893", "lastModified": "2024-11-21T02:37:33.330", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the agent in Persistent Accelerite Radia Client Automation (formerly HP Client Automation), possibly before 9.1, allows remote attackers to execute arbitrary code by sending a large amount of data in an environment that lacks relationship-based firewalling." }, { "lang": "es", "value": "Desbordamiento del buffer basado en pila en el agente en Persistent Accelerite Radia Client Automation (anteriormente HP Client Automation), posiblemente en versiones anteriores a 9.1, permite a atacantes remotos ejecutar c\u00f3digo arbitrario enviando gran cantidad de datos en un entorno que carece de firewall basado en relaci\u00f3n." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "baseScore": 10.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "availabilityImpact": "COMPLETE" }, "baseSeverity": "HIGH", "exploitabilityScore": 10.0, "impactScore": 10.0, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-119" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:accelerite:radia_client_automation:7.9:*:*:*:*:*:*:*", "matchCriteriaId": "C9902293-6C38-4386-A8FA-E7631E0C11B2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:accelerite:radia_client_automation:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "7184E653-B224-4555-96E3-C1FCB82C344D" }, { "vulnerable": true, "criteria": "cpe:2.3:a:accelerite:radia_client_automation:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "3D0D12E5-2639-42D2-B477-90A06593568F" }, { "vulnerable": true, "criteria": "cpe:2.3:a:accelerite:radia_client_automation:9.1:*:*:*:*:*:*:*", "matchCriteriaId": "790AA8D9-FA95-4CBE-AC48-C82AD2D39C58" } ] } ] } ], "references": [ { "url": "http://www.kb.cert.org/vuls/id/966927", "source": "cve@mitre.org" }, { "url": "http://www.securityfocus.com/bid/75966", "source": "cve@mitre.org" }, { "url": "http://www.securitytracker.com/id/1033861", "source": "cve@mitre.org" }, { "url": "http://zerodayinitiative.com/advisories/ZDI-15-363/", "source": "cve@mitre.org" }, { "url": "http://www.kb.cert.org/vuls/id/966927", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/75966", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securitytracker.com/id/1033861", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://zerodayinitiative.com/advisories/ZDI-15-363/", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }