This script is Copyright (C) 2011-2015 Tenable Network Security, Inc.
The remote Windows host contains a service that is susceptible to a
remote buffer overflow attack.
The version of Novell File Reporter (NFR) Engine installed on the
remote Windows host is earlier than 184.108.40.206. As such, it reportedly
has a flaw in its handling of HTTP requests to the TCP port used to
communicate with the NFR Agent, normally 3035. Specifically, the
application fails to check the size of user-supplied strings before
using them in a call to memcpy when parsing tags inside the '<RECORD>'
An unauthenticated, remote attacker with access to the service can
leverage this vulnerability to corrupt the process thread's stack,
possibly resulting in arbitrary code execution under the context of
the SYSTEM account.
See also :
Apply the security patch referenced in Novell's advisory.
Risk factor :
High / CVSS Base Score : 9.7
CVSS Temporal Score : 8.0
Public Exploit Available : true