SB2015042401 - Remote code execution in Realtek SDK



SB2015042401 - Remote code execution in Realtek SDK

Published: April 24, 2015 Updated: December 14, 2018

Security Bulletin ID SB2015042401
Severity
Critical
Patch available
NO
Number of vulnerabilities 1
Exploitation vector Remote access
Highest impact Code execution

Breakdown by Severity

Critical 100%
  • Low
  • Medium
  • High
  • Critical

Description

This security bulletin contains information about 1 security vulnerability.


1) Improper input validation (CVE-ID: CVE-2014-8361)

The vulnerability allows a remote attacker to execute arbitrary code on the target system.

The weakness exists within the miniigd SOAP service due to a failure to sanitize user data before executing a system call when handling malicious requests. A remote attacker can supply specially crafted NewInternalClient requests and execute arbitrary code with root privileges.

Successful exploitation of the vulnerability may result in system compromise.

Note: the vulnerability is being exploited by various attachers to deliver several Mirai variants (e.g., Satori, JenX, etc.).

Remediation

Cybersecurity Help is not aware of any official remediation provided by the vendor.