Novell Privileged User Manager Library Injection Arbitrary Code Execution (credentialed check)

Critical Nessus Plugin ID 40852


Arbitrary code can be executed on the remote host.


The version of the Novell Privileged User Manager Daemon running on the remote host contains a vulnerability that allows execution of arbitrary code.

Using a specially crafted 'spf' RPC call, an unauthenticated remote attacker can load arbitrary modules over the network and hence execute arbitrary code with the privileges of the daemon itself.


Install Novell Privileged User Manager Framework Patch version 2.2.0 (Rev. 15198).

See Also

Plugin Details

Severity: Critical

ID: 40852

File Name: novell_npum.nbin

Version: $Revision: 1.70 $

Type: local

Agent: windows

Family: Windows

Published: 2009/09/02

Modified: 2018/02/06

Dependencies: 13855

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2009/06/25

Vulnerability Publication Date: 2009/07/17

Reference Information

BID: 35752

OSVDB: 55996