How to Buy
This script is Copyright (C) 2012-2016 Tenable Network Security, Inc.
The remote host is running a service that is affected by a remote code
The version of Novell File Reporter (NFR) Agent running on the remote
host is affected by a remote code execution vulnerability due to a
buffer overflow condition. The specific flaw exists within
NFRAgent.exe, which listens on default TCP port 3037 over HTTPS. When
parsing tags inside the VOL element, the process performs insufficient
bounds checking on user supplied data prior to copying it into a
fixed-length buffer on the stack.
An unauthenticated, remote attacker, accessing the service, can
exploit this vulnerability to corrupt the process thread's stack,
possibly resulting in arbitrary code execution under the context of a
Note that only the NFR Agent running on a Windows OS is affected.
See also :
There is currently no patch for this vulnerability. One mitigation
strategy is to restrict interaction with the service to trusted
machines. Only the hosts that have a legitimate procedural
relationship with the Novell File Reporter Agent should be permitted
to communicate with it. This can be accomplished with firewall rules.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 8.5
Public Exploit Available : false
Family: Gain a shell remotely
Nessus Plugin ID: 62027 ()
Bugtraq ID: 55268
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.