Advisory Details

February 17th, 2011

Novell ZenWorks TFTPD Remote Code Execution Vulnerability

ZDI-11-089
ZDI-CAN-877

CVE ID CVE-2010-4323
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS Novell
AFFECTED PRODUCTS Zenworks
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['2132']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks Configuration Manager.
Authentication is not required to exploit this vulnerability.

The flaw exists within the novell-tftp.exe component which listens by default on UDP port 69. When handling a request the process blindly copies user supplied data into a fixed-length buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the ZenWorks user.

ADDITIONAL DETAILS Novell has issued an update to correct this vulnerability. More details can be found at:
http://www.novell.com/support/php/search.do?cmd=displayKC&docType=kc&externalId=7007896&sliceId=2&docTypeID=DT_TID_1_1&dialogID=205671351&stateId=0%200%20205669596
DISCLOSURE TIMELINE
  • 2010-08-23 - Vulnerability reported to vendor
  • 2011-02-17 - Coordinated public release of advisory
CREDIT Francis Provencher for Protek Researchh Lab's
AbdulAziz Hariri of ThirdEyeTesters
SilentSignal
BACK TO ADVISORIES