NetIQ Sentinel < 7.4.1 Multiple Vulnerabilities

This script is Copyright (C) 2016 Tenable Network Security, Inc.


Synopsis :

The NetIQ Sentinel server installed on the remote host is affected by
multiple vulnerabilities.

Description :

The version of Novell NetIQ Sentinel server installed on the remote
host is prior to 7.4.1. It is, therefore, affected by multiple
vulnerabilities :

- A flaw exists in Apache ActiveMQ in the
processControlCommand() function within the file
broker/TransportConnection.java. An unauthenticated,
remote attacker can exploit this, via a specially
crafted packet, to cause a denial of service condition.
(CVE-2014-3576)

- A flaw exists in the XMLTooling library due to a failure
to properly handle integer conversion exceptions. An
unauthenticated, remote attacker can exploit this, via a
crafted SAML message, to cause a denial of service
condition. (CVE-2015-0851)

- A remote code execution vulnerability exists due to
unsafe deserialize calls of unauthenticated Java objects
to the Apache Commons Collections (ACC) library. An
unauthenticated, remote attacker can exploit this, by
sending a specially crafted serialized Java object via
the RMI interface, to execute arbitrary code with the
privileges of the application. (VulnDB 135498)

See also :

https://download.novell.com/Download?buildid=ZEMvbiAk5k8~
http://www.nessus.org/u?e0204f30

Solution :

Upgrade to Novell NetIQ Sentinel version 7.4.1 or later.
Alternatively, contact the vendor for a workaround.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 8.3
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Misc.

Nessus Plugin ID: 90713 ()

Bugtraq ID: 76134
76272

CVE ID: CVE-2014-3576
CVE-2015-0851

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now