Novell ZENworks Configuration Management PreBoot Service Opcode Request Parsing Vulnerabilities

Critical Nessus Plugin ID 58968

Synopsis

The remote Windows host contains an application that is affected by multiple vulnerabilities.

Description

According to its version, the instance of ZENworks Configuration Management installed on the remote Windows host has several vulnerabilities in its PreBoot service :

- An arbitrary file download vulnerability via opcode 0x21 may allow an attacker to download any file on the remote system. (TID 7009969)

- A stack-based buffer overflow vulnerability via opcode 0x6c may allow an attacker to execute arbitrary code on the remote system. (TID 7009970)

- A stack-based buffer overflow vulnerability via opcode 0x4c may allow an attacker to execute arbitrary code on the remote system. (TID 7009971)

Solution

Upgrade to version 11.2 or apply the patch in the advisory.

See Also

http://www.nessus.org/u?8373bda8

Plugin Details

Severity: Critical

ID: 58968

File Name: novell_zcm_preboot_5127930.nasl

Version: 1.13

Type: local

Agent: windows

Family: Windows

Published: 2012/05/02

Modified: 2018/07/16

Dependencies: 58445

Risk Information

Risk Factor: Critical

CVSSv2

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:novell:zenworks_configuration_management

Required KB Items: SMB/Novell/ZENworks/Installed

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2012/02/23

Vulnerability Publication Date: 2012/02/23

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Novell ZENworks Configuration Management Preboot Service 0x21 Buffer Overflow)

ExploitHub (EH-12-800)

Reference Information

CVE: CVE-2011-3175, CVE-2011-3176, CVE-2012-2215

BID: 52659