Novell Client nicm.sys Local Privilege Escalation

high Nessus Plugin ID 29898

Synopsis

The remote Windows host contains a driver that is affected by a local privilege escalation vulnerability.

Description

The file 'NICM.SYS' included with the Novell Client software and installed on the remote host reportedly allows local users to open the device '\\.\nicm' and execute arbitrary code in kernel mode using specially-constructed input.

Solution

Install the 491psp3_4_nicm.zip patch referenced in the vendor advisory above.

See Also

http://www.nessus.org/u?338eb9b5

https://seclists.org/bugtraq/2008/Jan/108

http://download.novell.com/Download?buildid=4FmI89wOmg4~

Plugin Details

Severity: High

ID: 29898

File Name: novell_nicm_priv_escalation.nasl

Version: 1.18

Type: local

Agent: windows

Family: Windows

Published: 1/10/2008

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 6.7

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 5.6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 1/9/2008

Reference Information

CVE: CVE-2007-5762

BID: 27209

CWE: 20