Novell File Reporter Agent XML Tag Handling Buffer Overflow

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host contains a service that is vulnerable to a
remote buffer overflow attack.

Description :

The version of Novell File Reporter (NFR) Agent installed on the
remote Windows host is earlier than 1.0.4.2. Such versions reportedly
have a buffer overflow vulnerability because the service, which
listens by default on TCP port 3037, blindly copies user-supplied data
into a fixed-length buffer on the stack when handling the contents of
an XML tag.

An unauthenticated, remote attacker with access to the agent service
can leverage this issue to execute arbitrary code under the context of
the SYSTEM user.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-11-116/
http://seclists.org/bugtraq/2011/Apr/30
http://download.novell.com/Download?buildid=rCAgCcbPH9s~

Solution :

Upgrade to Novell File Reporter 1.0.2, which includes NFR Agent
version 1.0.4.2.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 53536 ()

Bugtraq ID: 47144

CVE ID: CVE-2011-0994

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now