Novell File Reporter Agent XML Parsing Remote Code Execution

critical Nessus Plugin ID 62026
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote Windows host contains a service that is vulnerable to a remote buffer overflow attack.


The version of Novell File Reporter (NFR) Agent running on the remote host is earlier than Such versions reportedly have a buffer overflow vulnerability because the service, which listens by default on TCP port 3037, blindly copies user supplied data into a fixed-length buffer on the stack when handling the contents of an XML tag.

An unauthenticated, remote attacker who can access the agent service can leverage this issue to execute arbitrary code under the context of the SYSTEM user.


Upgrade to Novell File Reporter 1.0.2, which includes NFR Agent version

See Also

Plugin Details

Severity: Critical

ID: 62026

File Name: novell_file_reporter_agent_stack_overflow.nbin

Version: 1.59

Type: remote

Published: 9/10/2012

Updated: 4/20/2021

Dependencies: novell_file_reporter_agent_detect.nbin

Risk Information


Risk Factor: High

Score: 7.4


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:F/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:novell:file_reporter

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 4/4/2011

Vulnerability Publication Date: 4/4/2011

Exploitable With

CANVAS (D2ExploitPack)

Core Impact

Reference Information

CVE: CVE-2011-0994

BID: 47144