Novell NetIQ Sentinel Agent Manager NQMcsVarSet ActiveX DumpToFile() Remote Code Execution

This script is Copyright (C) 2014 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an ActiveX control that is affected by a
remote code execution vulnerability.

Description :

The remote host contains the NQMcsVarSet ActiveX control distributed
with Novell NetIQ Sentinel Agent Manager.

The installed control is reportedly affected by a remote code
execution vulnerability with the DumpToFile method where it does not
properly sanitize the path for a filename. This could allow a remote
attacker, with a specially crafted file or site, to traverse the
directories to execute arbitrary code.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-14-134/
https://www.novell.com/support/kb/doc.php?id=7015183

Solution :

Update Novell NetIQ Sentinel Agent Manager to version 7.2 or later, or
ensure the kill bit has been set for the NQMcsVarSet ActiveX Control.

Risk factor :

Medium / CVSS Base Score : 6.8
(CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P)
CVSS Temporal Score : 5.9
(CVSS2#E:ND/RL:OF/RC:C)
Public Exploit Available : false

Family: Windows

Nessus Plugin ID: 74261 ()

Bugtraq ID: 67487

CVE ID: CVE-2014-3460

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now