Novell ZENworks Configuration Management PreBoot Service Opcode Request Parsing Vulnerabilities

critical Nessus Plugin ID 58968

Synopsis

The remote Windows host contains an application that is affected by multiple vulnerabilities.

Description

According to its version, the instance of ZENworks Configuration Management installed on the remote Windows host has several vulnerabilities in its PreBoot service :

- An arbitrary file download vulnerability via opcode 0x21 may allow an attacker to download any file on the remote system. (TID 7009969)

- A stack-based buffer overflow vulnerability via opcode 0x6c may allow an attacker to execute arbitrary code on the remote system. (TID 7009970)

- A stack-based buffer overflow vulnerability via opcode 0x4c may allow an attacker to execute arbitrary code on the remote system. (TID 7009971)

Solution

Upgrade to version 11.2 or apply the patch in the advisory.

See Also

http://www.nessus.org/u?8373bda8

Plugin Details

Severity: Critical

ID: 58968

File Name: novell_zcm_preboot_5127930.nasl

Version: 1.13

Type: local

Agent: windows

Family: Windows

Published: 5/2/2012

Updated: 7/16/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:novell:zenworks_configuration_management

Required KB Items: SMB/Novell/ZENworks/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2/23/2012

Vulnerability Publication Date: 2/23/2012

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Novell ZENworks Configuration Management Preboot Service 0x21 Buffer Overflow)

ExploitHub (EH-12-800)

Reference Information

CVE: CVE-2011-3175, CVE-2011-3176, CVE-2012-2215

BID: 52659