CVE-2015-7860
Description
Stack-based buffer overflow in the agent in Persistent Accelerite Radia Client Automation (formerly HP Client Automation), possibly before 9.1, allows remote attackers to execute arbitrary code by sending a large amount of data in an environment that lacks relationship-based firewalling.
AI Insight
LLM-synthesized narrative grounded in this CVE's description and references.
Stack-based buffer overflow in HP/Radia Client Automation agent allows unauthenticated remote code execution as SYSTEM.
Vulnerability
A stack-based buffer overflow exists in the agent component of Hewlett-Packard Client Automation (now Persistent Accelerite Radia Client Automation) prior to version 9.1. The flaw is triggered when the agent receives a large buffer of data over the network. No authentication is required to reach the vulnerable code path [1][2].
Exploitation
An unauthenticated remote attacker can send a specially crafted, oversized buffer to the agent. The agent fails to properly validate the size of the incoming data, causing a stack buffer overflow. This can be achieved without any prior access or user interaction, provided the target environment does not employ relationship-based firewalling that would block the network traffic [1][2].
Impact
Successful exploitation allows an attacker to execute arbitrary code with SYSTEM privileges, resulting in complete compromise of the affected system. The attacker gains full control over confidentiality, integrity, and availability of the host [1][2].
Mitigation
Persistent Accelerite released a hotfix for this issue; the vulnerability is fixed in Radia Client Automation version 9.1 and later. Organizations should update to the latest version. If patching is not immediately possible, network-level access controls (e.g., firewalls) should be applied to restrict traffic to the agent port from untrusted sources [2].
AI Insight generated on May 23, 2026. Synthesized from this CVE's description and the cited reference URLs; citations are validated against the source bundle.
Affected products
5cpe:2.3:a:accelerite:radia_client_automation:7.9:*:*:*:*:*:*:*+ 3 more
- cpe:2.3:a:accelerite:radia_client_automation:7.9:*:*:*:*:*:*:*
- cpe:2.3:a:accelerite:radia_client_automation:8.1:*:*:*:*:*:*:*
- cpe:2.3:a:accelerite:radia_client_automation:9.0:*:*:*:*:*:*:*
- cpe:2.3:a:accelerite:radia_client_automation:9.1:*:*:*:*:*:*:*
- Range: <9.1
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
4News mentions
0No linked articles in our index yet.