Novell ZENworks Configuration Management < 11.3.0.35304 PreBoot Service Directory Traversal

This script is Copyright (C) 2014-2015 Tenable Network Security, Inc.


Synopsis :

An application on the remote host is affected by a directory traversal
vulnerability.

Description :

The remote host has a version of Novell ZENworks Configuration
Management installed prior to 11 SP3 (11.3.0.35304). It is, therefore,
affected by a directory traversal vulnerability due to improper
validation of an unspecified parameter of the PreBoot Service when
reading files. A remote, unauthenticated attacker may be able to read
arbitrary files.

See also :

https://www.tenable.com/security/research/tra-2014-02
http://www.zerodayinitiative.com/advisories/ZDI-14-055/
http://www.novell.com/support/kb/doc.php?id=7014663
http://www.novell.com/support/kb/doc.php?id=7014213

Solution :

Upgrade to Novell ZENworks SP3 (11.3.0.35304) or later.

Risk factor :

Medium / CVSS Base Score : 5.0
(CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N)
CVSS Temporal Score : 4.3
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 72814 ()

Bugtraq ID: 65912

CVE ID: CVE-2013-3706

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now