Vous êtes ici: index » cert » avis

Avis du CERT RENATER

Par défaut, cette page vous affichera les derniers messages envoyés par le CERT RENATER à la communauté. Vous pouvez affiner par année ou par type de message. Si aucun critère n'est précisé, seuls les derniers messages sont affichés

Date : Fri, 09 Dec 2011 10:05:49 +0100
Type : VULN
Sujet : CERT-Renater : 2011/VULN646 (Novell : Novell ZAM 7.5 Remote Code Execution Vulnerability)
====================================================================
                                     CERT-Renater

                          Note d'Information No. 2011/VULN646
_____________________________________________________________________

DATE                : 09/12/2011

HARDWARE PLATFORM(S): /

OPERATING SYSTEM(S) : Systems running Novell ZENworks Asset Management.

======================================================================
http://download.novell.com/Download?buildid=hPvHtXeNmCU~
http://www.zerodayinitiative.com/advisories/ZDI-11-342
______________________________________________________________________

This document (5115590) is provided subject to the disclaimer  at the
end of this document.

patches this patch supersedes
This patch does not supersede any other patches.

patches that supersede this patch
This patch is not superseded by any other patches.

patch attributes
Architecture: x86, x86-64
Security patch: Yes
Priority: Recommended
Distribution Type: Limited
http://download.novell.com/Download?buildid=hPvHtXeNmCU~

document
Revision: 1
Document ID: 5115590
Creation Date: 2011-11-02 11:38:23


abstract

02 Nov 2011 - Release of patch
details

Overview: This patch addresses a remote code execution vulnerability.

System Requirements: ZAM 7.5 IR 25

Installation:

Steps to apply the patch

---------------------------------------



1) Stop the Apache Tomcat Service

2) Take a backup of the rtrlet folder & rtrlet.war present in
\Tomcat5\weapps

3) Delete the rtrlet.war & rtrlet folder from
\Tomcat5\weapps

4) Replace the attached rtrlet.war at \Tomcat5\weapps

5) Restart the Apache Tomcat Service.


Known Problems and Limitations:  None

Technical Support Information:

CVE-2011-2653

Reporter: TippingPoint


security fixes

CVE-2011-2653

Reporter: TippingPoint
file contents
Files Included	Size	Date
SECURITY_Vulnerability_ZAM_7.5.zip	8.3 MB (8786335)	2011-11-02 11:33:34
readme_5115590.html	N/A	2011-11-02 11:42:00
disclaimer

The Origin of this information may be internal or external to Novell.
Novell makes all reasonable efforts to verify this information.
However, the information provided in this document is for your
information only. Novell makes no explicit or implied claims to
the validity of this information. Any trademarks referenced in
this document are the property of their respective owners.
Consult your product manuals for complete trademark information.

Novell is a registered trademark of Novell, Inc. in the United
States and other countries. SUSE is a registered trademark of
SUSE Linux AG, a Novell business. *All third-party trademarks
are the property of their respective owners.

______________________________________________________________________

ZDI-11-342 : Novell ZENworks Asset Management Remote Code Execution
Vulnerability
http://www.zerodayinitiative.com/advisories/ZDI-11-342
December  7, 2011

- - -- CVE ID:
CVE-2011-2653

- - -- CVSS:
9.7, AV:N/AC:L/Au:N/C:C/I:C/A:P

- - -- Affected Vendors:

Novell



- - -- Affected Products:

Novell Zenworks



- - -- TippingPoint(TM) IPS Customer Protection:
TippingPoint IPS customers have been protected against this
vulnerability by Digital Vaccine protection filter ID 11916.
For further product information on the TippingPoint IPS, visit:

     http://www.tippingpoint.com

- - -- Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Novell Zenworks Asset Management.
Authentication is not required to exploit this vulnerability.

The flaw exists within the rtrlet component. This process listens on TCP
port 8080. When handling an unauthenticated file upload the process does
not properly sanitize the path. Directory traversal can be used to drop
a file in an arbitrary location and a null byte inserted into the
filename to provide arbitrary extension. A remote attacker can exploit
this vulnerability to execute arbitrary code under the context of SYSTEM.

- - -- Vendor Response:

Novell has issued an update to correct this vulnerability. More details
can be found at:

http://download.novell.com/Download?buildid=hPvHtXeNmCU~



- - -- Disclosure Timeline:
2011-07-25 - Vulnerability reported to vendor
2011-12-07 - Coordinated public release of advisory

- - -- Credit:
This vulnerability was discovered by:

* Anonymous



- - -- About the Zero Day Initiative (ZDI):
Established by TippingPoint, The Zero Day Initiative (ZDI) represents
a best-of-breed model for rewarding security researchers for responsibly
disclosing discovered vulnerabilities.

Researchers interested in getting paid for their security research
through the ZDI can find more information and sign-up at:

     http://www.zerodayinitiative.com

The ZDI is unique in how the acquired vulnerability information is
used. TippingPoint does not re-sell the vulnerability details or any
exploit code. Instead, upon notifying the affected product vendor,
TippingPoint provides its customers with zero day protection through
its intrusion prevention technology. Explicit details regarding the
specifics of the vulnerability are not exposed to any parties until
an official vendor patch is publicly available. Furthermore, with the
altruistic aim of helping to secure a broader user base, TippingPoint
provides this vulnerability information confidentially to security
vendors (including competitors) who have a vulnerability protection or
mitigation product.

Our vulnerability disclosure policy is available online at:

     http://www.zerodayinitiative.com/advisories/disclosure_policy/

Follow the ZDI on Twitter:

     http://twitter.com/thezdi

======================================================================

            =========================================================
            Les serveurs de référence du CERT-Renater
            http://www.urec.fr/securite
            http://www.cru.fr/securite
            http://www.renater.fr
            =========================================================
            + CERT-RENATER          | tel : 01-53-94-20-44          +
            + 23 - 25 Rue Daviel    | fax : 01-53-94-20-41          +
            + 75013 Paris           | email: certsvp@renater.fr     +
            =========================================================

[An attachment of type application/pkcs7-signature was included here]