Novell Client / Client 2 Multiple Vulnerabilities

high Nessus Plugin ID 69557

Synopsis

The remote host has a client application installed that is affected by multiple vulnerabilities.

Description

The version of Novell Client or Novell Client 2 installed on the remote Windows host is potentially affected by the following vulnerabilities :

- An error exists related to 'nicm.sys' and handling '0x143b6b' IOCTL requests that could allow arbitrary code execution. (CVE-2013-3956)

- An integer overflow exists related to 'nwfs.sys' and handling '0x1439B' IOCTL requests that could allow arbitrary code execution. (CVE-2013-3697)

Solution

Apply the patch referenced in the vendor's advisory.

See Also

https://support.microfocus.com/kb/doc.php?id=7012497

Plugin Details

Severity: High

ID: 69557

File Name: novell_client_priv_escalation2.nasl

Version: 1.5

Type: local

Agent: windows

Family: Windows

Published: 9/3/2013

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: High

Base Score: 7.2

Temporal Score: 6

Vector: CVSS2#AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:novell:client

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 5/13/2013

Vulnerability Publication Date: 5/10/2013

Exploitable With

CANVAS (CANVAS)

Core Impact

Metasploit (Novell Client 2 SP3 nicm.sys Local Privilege Escalation)

Reference Information

CVE: CVE-2013-3697, CVE-2013-3956

BID: 60202, 60203