|CVSS SCORE||9.4, (AV:N/AC:L/Au:N/C:C/I:C/A:N)|
Proficy Real-Time Information Portal
|TIPPINGPOINT™ IPS CUSTOMER PROTECTION||TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 11491. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
This specific flaw exists within the Remote Interface Service (rifsrvd.exe). The Remote Interface Service listens on TCP port 5159 by default. The process does not sufficiently validate two input strings that are used to create a configuration file on the server. Remote, unauthenticated attackers can exploit this vulnerability by sending malformed ID_SAVE_SRVC_CFG message packets to the target, which could ultimately lead to remote code execution under the context of the SYSTEM user.
GE has issued an update to correct this vulnerability. More details can be found at: