Novell File Reporter Agent XML Tag Handling Buffer Overflow

critical Nessus Plugin ID 53536

Synopsis

The remote Windows host contains a service that is vulnerable to a remote buffer overflow attack.

Description

The version of Novell File Reporter (NFR) Agent installed on the remote Windows host is earlier than 1.0.4.2. Such versions reportedly have a buffer overflow vulnerability because the service, which listens by default on TCP port 3037, blindly copies user-supplied data into a fixed-length buffer on the stack when handling the contents of an XML tag.

An unauthenticated, remote attacker with access to the agent service can leverage this issue to execute arbitrary code under the context of the SYSTEM user.

Solution

Upgrade to Novell File Reporter 1.0.2, which includes NFR Agent version 1.0.4.2.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-11-116/

https://seclists.org/bugtraq/2011/Apr/30

http://download.novell.com/Download?buildid=leLxi7tQACs~&patch_redirect=true&old_patch=rCAgCcbPH9s~

Plugin Details

Severity: Critical

ID: 53536

File Name: novell_file_reporter_agent_1_0_2.nasl

Version: 1.13

Type: local

Agent: windows

Family: Windows

Published: 4/22/2011

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:novell:file_reporter

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/4/2011

Vulnerability Publication Date: 4/4/2011

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Reference Information

CVE: CVE-2011-0994

BID: 47144