SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Generic)  >   Novell ZENworks Vendors:   Novell
Novell ZENworks Asset Management Directory Traversal Flaw Lets Remote Users Overwrite Files and Execute Arbitrary Code
SecurityTracker Alert ID:  1025313
SecurityTracker URL:  http://securitytracker.com/id/1025313
CVE Reference:   CVE-2010-4229   (Links to External Site)
Updated:  Sep 7 2011
Original Entry Date:  Apr 11 2011
Impact:   Execution of arbitrary code via network, Modification of system information, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 10.3.2, 11.0
Description:   A vulnerability was reported in Novell ZENworks Asset Management. A remote user can execute arbitrary code on the target system.

A remote user can send a specially crafted file path name to a file upload servlet to overwrite files on the target system. This can be exploited to execute arbitrary code on the target system.

The vendor was notified on November 30, 2010.

AbdulAziz Hariri of ThirdEyeTesters reported this vulnerability via TippingPoint's Zero Day Initiative.

Impact:   A remote user can execute arbitrary code on the target system.
Solution:   The vendor has issued a fix (10.3.2, 11.1).

The vendor's advisory is available at:

http://www.novell.com/support/search.do?cmd=displayKC&externalId=7007841

Vendor URL:  www.novell.com/support/search.do?cmd=displayKC&externalId=7007841 (Links to External Site)
Cause:   Access control error, Input validation error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2020, SecurityGlobal.net LLC