Unrestricted file upload vulnerability in RADactive I-Load before 2008.2.5.0 allows remote attackers to execute arbitrary code by uploading a file with an executable extension, and then sending a request for a predictable filename during a short time window.
The product contains a concurrent code sequence that requires temporary, exclusive access to a shared resource, but a timing window exists in which the shared resource can be modified by another code sequence operating concurrently.
Link | Tags |
---|---|
http://www.securityfocus.com/archive/1/506555/100/0/threaded | mailing list |
http://secunia.com/advisories/23807 | third party advisory vendor advisory |
http://radnet.radactive.com/forum/Default.aspx?g=posts&t=339 | |
http://www.osvdb.org/58197 | vdb entry |
https://www.sec-consult.com/files/20090917-0_RADactive_I-Load_Multiple_Vulnerabilities.txt |