|CVSS SCORE||7.5, (AV:N/AC:L/Au:N/C:P/I:P/A:P)|
Server and Application Monitor
|TIPPINGPOINT™ IPS CUSTOMER PROTECTION||TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 16731. For further product information on the TippingPoint IPS: http://www.tippingpoint.com|
The specific flaw exists within the 'factory' object's loadExtensionFactory method. By supplying a UNC path to a controlled binary, a remote attacker can execute arbitrary code under the context of the process.
SolarWinds has issued an update to correct this vulnerability. More details can be found at:
|CREDIT||Andrea Micalizzi (rgod)