Novell NetIQ Sentinel Agent Manager NQMcsVarSet ActiveX DumpToFile() Remote Code Execution

Medium Nessus Plugin ID 74261


The remote Windows host has an ActiveX control that is affected by a remote code execution vulnerability.


The remote host contains the NQMcsVarSet ActiveX control distributed with Novell NetIQ Sentinel Agent Manager.

The installed control is reportedly affected by a remote code execution vulnerability with the DumpToFile method where it does not properly sanitize the path for a filename. This could allow a remote attacker, with a specially crafted file or site, to traverse the directories to execute arbitrary code.


Update Novell NetIQ Sentinel Agent Manager to version 7.2 or later, or ensure the kill bit has been set for the NQMcsVarSet ActiveX Control.

See Also

Plugin Details

Severity: Medium

ID: 74261

File Name: novell_netiq_activex_nqmcsvarset.nasl

Version: $Revision: 1.3 $

Type: local

Agent: windows

Family: Windows

Published: 2014/06/02

Modified: 2014/06/23

Dependencies: 13855

Risk Information

Risk Factor: Medium


Base Score: 6.8

Temporal Score: 5.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:P/I:P/A:P

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:netiq:sentinel_agent_manager

Required KB Items: SMB/Registry/Enumerated

Exploit Available: false

Exploit Ease: No known exploits are available

Vulnerability Publication Date: 2014/05/19

Reference Information

CVE: CVE-2014-3460

BID: 67487

OSVDB: 107095