T-015: InstallShield / Macrovision / Acresso FLEXnet Connect Vulnerabilities


 
Thread Tools Search this Thread
Special Forums Cybersecurity Security Advisories (RSS) T-015: InstallShield / Macrovision / Acresso FLEXnet Connect Vulnerabilities
# 1  
Old 11-13-2008
T-015: InstallShield / Macrovision / Acresso FLEXnet Connect Vulnerabilities

Acresso FLEXnet Connect executes scripts that are insecurely retrieved from a remote web server, which can allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system. The risk is MEDIUM. By modifying the rule script that is sent to a FLEXnet Connect client, a remote unauthenticated attacker may be able to execute arbitrary code on a vulnerable system.


More...
Login or Register to Ask a Question

Previous Thread | Next Thread

2 More Discussions You Might Find Interesting

1. HP-UX

installshield....

hi all is it possible to automate installaion process of any software on unix? for eg. we have our front end on windows and we have installshield package that installs everything creating folder structure to creating database. now we are planning to automate our backend installation like... (0 Replies)
Discussion started by: zedex
0 Replies

2. Solaris

some questions on 310-015

hi can any1 pls ans these questions 22. Which two statements about the functionality of the syslogd daemon are true? (Choose two) A. Error messages can only be logged locally in a system log. B. The kernel, daemons, and syslogd each write directly to a system log. C. Syslogd can write... (1 Reply)
Discussion started by: azeem_3001
1 Replies
Login or Register to Ask a Question
RSH(1)							      General Commands Manual							    RSH(1)

NAME
rsh - remote shell SYNOPSIS
rsh [-n] [-l username] host [command] host [-n] [-l username] [command] DESCRIPTION
Rsh connects to the specified host, and executes the specified command. Rsh copies its standard input to the remote command, the standard output of the remote command to its standard output, and the standard error of the remote command to its standard error. Interrupt, quit and terminate signals are propagated to the remote command; rsh normally terminates when the remote command does. The remote username used is the same as your local username, unless you specify a different remote name with the -l option. This remote name must be equivalent (in the sense of rlogin(1)) to the originating account; no provision is made for specifying a password with a com- mand. If you omit command, then instead of executing a single command, you will be logged in on the remote host using rlogin(1). Shell metacharacters which are not quoted are interpreted on local machine, while quoted metacharacters are interpreted on the remote machine. Thus the command rsh otherhost cat remotefile >> localfile appends the remote file remotefile to the localfile localfile, while rsh otherhost cat remotefile ">>" otherremotefile appends remotefile to otherremotefile. OPTIONS
-l username Specify the remote user name. -n Connect standard input of the remote command to /dev/null. Do this if rsh should not inadvertently read from standard input. SEE ALSO
rcp(1), rlogin(1), rhosts(5). BUGS
You cannot run an interactive command (like rogue(6) or vi(1)); use rlogin(1). 4.2 Berkeley Distribution April 29, 1985 RSH(1)