Novell File Reporter Agent VOL Tag Remote Code Execution (uncredentialed check)

critical Nessus Plugin ID 62027
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.


The remote host is running a service that is affected by a remote code execution vulnerability.


The version of Novell File Reporter (NFR) Agent running on the remote host is affected by a remote code execution vulnerability due to a buffer overflow condition. The specific flaw exists within NFRAgent.exe, which listens on default TCP port 3037 over HTTPS. When parsing tags inside the VOL element, the process performs insufficient bounds checking on user supplied data prior to copying it into a fixed-length buffer on the stack.

An unauthenticated, remote attacker, accessing the service, can exploit this vulnerability to corrupt the process thread's stack, possibly resulting in arbitrary code execution under the context of a privileged account.

Note that only the NFR Agent running on a Windows OS is affected.


There is currently no patch for this vulnerability. One mitigation strategy is to restrict interaction with the service to trusted machines. Only the hosts that have a legitimate procedural relationship with the Novell File Reporter Agent should be permitted to communicate with it. This can be accomplished with firewall rules.

See Also

Plugin Details

Severity: Critical

ID: 62027

File Name: novell_file_reporter_agent_zdi-12-167.nbin

Version: 1.63

Type: remote

Published: 9/10/2012

Updated: 4/20/2021

Dependencies: os_fingerprint.nasl, novell_file_reporter_agent_stack_overflow.nbin

Risk Information


Risk Factor: Critical

Base Score: 10

Temporal Score: 8.5

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:U/RC:ND

Vulnerability Information

CPE: cpe:/a:novell:file_reporter

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 8/29/2012

Reference Information

BID: 55268