Advisory Details

December 7th, 2011

Novell ZENworks Asset Management Remote Code Execution Vulnerability

ZDI-11-342
ZDI-CAN-1282

CVE ID CVE-2011-2653
CVSS SCORE 9.7, AV:N/AC:L/Au:N/C:C/I:C/A:P
AFFECTED VENDORS Novell
AFFECTED PRODUCTS Zenworks
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['11916']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks Asset Management. Authentication is not required to exploit this vulnerability.

The flaw exists within the rtrlet component. This process listens on TCP port 8080. When handling an unauthenticated file upload the process does not properly sanitize the path. Directory traversal can be used to drop a file in an arbitrary location and a null byte inserted into the filename to provide arbitrary extension. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of SYSTEM.

ADDITIONAL DETAILS Novell has issued an update to correct this vulnerability. More details can be found at:
http://download.novell.com/Download?buildid=hPvHtXeNmCU~
DISCLOSURE TIMELINE
  • 2011-07-25 - Vulnerability reported to vendor
  • 2011-12-07 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES