Novell Privileged User Manager Library Injection Arbitrary Code Execution (credentialed check)

critical Nessus Plugin ID 40852

Synopsis

Arbitrary code can be executed on the remote host.

Description

The version of the Novell Privileged User Manager Daemon running on the remote host contains a vulnerability that allows execution of arbitrary code.

Using a specially crafted 'spf' RPC call, an unauthenticated remote attacker can load arbitrary modules over the network and hence execute arbitrary code with the privileges of the daemon itself.

Solution

Install Novell Privileged User Manager Framework Patch version 2.2.0 (Rev. 15198).

See Also

https://www.zerodayinitiative.com/advisories/ZDI-09-046/

https://support.microfocus.com/kb/doc.php?id=7003640

Plugin Details

Severity: Critical

ID: 40852

File Name: novell_npum.nbin

Version: 1.210

Type: local

Agent: windows

Family: Windows

Published: 9/2/2009

Updated: 3/26/2024

Supported Sensors: Nessus Agent, Nessus

Risk Information

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 6/25/2009

Vulnerability Publication Date: 7/17/2009

Reference Information

BID: 35752