SB2015042401 - Remote code execution in Realtek SDK
Published: April 24, 2015 Updated: December 14, 2018
Security Bulletin ID
SB2015042401
Severity
Critical
Patch available
NO
Number of vulnerabilities
1
Exploitation vector
Remote access
Highest impact
Code execution
Breakdown by Severity
- Low
- Medium
- High
- Critical
Description
This security bulletin contains information about 1 security vulnerability.
1) Improper input validation (CVE-ID: CVE-2014-8361)
The vulnerability allows a remote attacker to execute arbitrary code on the target system.The weakness exists within the miniigd SOAP service due to a failure to sanitize user data before executing a system call when handling malicious requests. A remote attacker can supply specially crafted NewInternalClient requests and execute arbitrary code with root privileges.
Successful exploitation of the vulnerability may result in system compromise.
Note: the vulnerability is being exploited by various attachers to deliver several Mirai variants (e.g., Satori, JenX, etc.).
Remediation
Cybersecurity Help is not aware of any official remediation provided by the vendor.