Summary
Detail | |||
---|---|---|---|
Vendor | Novell | First view | 2012-04-09 |
Product | Zenworks Configuration Management | Last view | 2020-01-25 |
Version | 11.1 | Type | Application |
Update | * | ||
Edition | * | ||
Language | * | ||
Sofware Edition | * | ||
Target Software | * | ||
Target Hardware | * | ||
Other | * | ||
CPE Product | cpe:2.3:a:novell:zenworks_configuration_management |
Activity : Overall
Related : CVE
Date | Alert | Description | |
---|---|---|---|
7.5 | 2020-01-25 | CVE-2012-6345 | Novell ZENworks Configuration Management before 11.2.4 allows obtaining sensitive trace information. |
6.1 | 2020-01-25 | CVE-2012-6344 | Novell ZENworks Configuration Management before 11.2.4 allows XSS. |
9.8 | 2014-09-24 | CVE-2014-7169 | GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271. |
9.8 | 2014-09-24 | CVE-2014-6271 | GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix. |
6.8 | 2013-11-02 | CVE-2013-6347 | Session fixation vulnerability in Novell ZENworks Configuration Management (ZCM) before 11.2.4 allows remote attackers to hijack web sessions via unspecified vectors. |
6.8 | 2013-11-02 | CVE-2013-6346 | Cross-site request forgery (CSRF) vulnerability in the ZCC page in Novell ZENworks Configuration Management (ZCM) before 11.2.4 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors. |
10 | 2013-11-02 | CVE-2013-6345 | Unspecified vulnerability in the ZCC page in Novell ZENworks Configuration Management (ZCM) before 11.2.4 has unknown impact and attack vectors related to an "Application Exception." |
4.3 | 2013-11-02 | CVE-2013-6344 | The ZCC page in Novell ZENworks Configuration Management (ZCM) before 11.2.4 allows attackers to conduct cross-frame scripting attacks via unknown vectors. |
6.8 | 2013-03-29 | CVE-2013-1079 | Directory traversal vulnerability in the ISCreateObject method in an ActiveX control in InstallShield\ISProxy.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.3 through 11.2 allows remote attackers to execute arbitrary local DLL files via a crafted web page that also calls the Initialize method. |
4.3 | 2012-04-11 | CVE-2012-2223 | The xplat agent in Novell ZENworks Configuration Management (ZCM) 10.3.x before 10.3.4 and 11.x before 11.2 enables the HTTP TRACE method, which might make it easier for remote attackers to conduct cross-site tracing (XST) attacks via unspecified vectors. |
5 | 2012-04-09 | CVE-2012-2215 | Directory traversal vulnerability in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to read arbitrary files via an opcode 0x21 request. |
10 | 2012-04-09 | CVE-2011-3176 | Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x4c request. |
10 | 2012-04-09 | CVE-2011-3175 | Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x6c request. |
CWE : Common Weakness Enumeration
% | id | Name |
---|---|---|
18% (2) | CWE-119 | Failure to Constrain Operations within the Bounds of a Memory Buffer |
18% (2) | CWE-79 | Failure to Preserve Web Page Structure ('Cross-site Scripting') |
18% (2) | CWE-78 | Improper Sanitization of Special Elements used in an OS Command ('O... |
18% (2) | CWE-22 | Improper Limitation of a Pathname to a Restricted Directory ('Path ... |
9% (1) | CWE-352 | Cross-Site Request Forgery (CSRF) |
9% (1) | CWE-287 | Improper Authentication |
9% (1) | CWE-200 | Information Exposure |
SAINT Exploits
Description | Link |
---|---|
Novell ZENworks Configuration Management Preboot Service Opcode 4c Vulnerability | More info here |
Novell ZENworks Configuration Management Preboot Service Opcode 6c Vulnerability | More info here |
Bash environment variable code injection over HTTP | More info here |
Bash Environment Variable Handling Shell Command Injection Via CUPS | More info here |
ShellShock DHCP Server | More info here |
ExploitDB Exploits
id | Description |
---|---|
35146 | PHP 5.x Shellshock Exploit (bypass disable_functions) |
35115 | CUPS Filter Bash Environment Variable Code Injection |
34879 | OpenVPN 2.2.29 - ShellShock Exploit |
34860 | GNU bash 4.3.11 Environment Variable dhclient Exploit |
34839 | IPFire Cgi Web Interface Authenticated Bash Environment Variable Code Injecti... |
34777 | GNU bash Environment Variable Command Injection (MSF) |
Information Assurance Vulnerability Management (IAVM)
id | Description |
---|---|
2014-A-0142 | GNU Bash Shell Code Execution Vulnerability Severity: Category I - VMSKEY: V0054753 |
Snort® IPS/IDS
Date | Description |
---|---|
2015-07-13 | Linux.Trojan.ChinaZ outbound connection RuleID : 34847 - Type : MALWARE-CNC - Revision : 3 |
2014-10-30 | Bash environment variable injection attempt RuleID : 32366-community - Type : OS-OTHER - Revision : 2 |
2014-12-02 | Bash environment variable injection attempt RuleID : 32366 - Type : OS-OTHER - Revision : 2 |
2014-10-24 | Bash CGI environment variable injection attempt RuleID : 32336-community - Type : OS-OTHER - Revision : 2 |
2014-11-25 | Bash CGI environment variable injection attempt RuleID : 32336 - Type : OS-OTHER - Revision : 2 |
2014-10-24 | Bash CGI environment variable injection attempt RuleID : 32335-community - Type : OS-OTHER - Revision : 2 |
2014-11-25 | Bash CGI environment variable injection attempt RuleID : 32335 - Type : OS-OTHER - Revision : 2 |
2014-10-03 | Bash environment variable injection attempt RuleID : 32069-community - Type : OS-OTHER - Revision : 3 |
2014-11-16 | Bash environment variable injection attempt RuleID : 32069 - Type : OS-OTHER - Revision : 3 |
2014-10-01 | Bash environment variable injection attempt RuleID : 32043-community - Type : OS-OTHER - Revision : 3 |
2014-11-16 | Bash environment variable injection attempt RuleID : 32043 - Type : OS-OTHER - Revision : 3 |
2014-10-01 | Bash environment variable injection attempt RuleID : 32042-community - Type : OS-OTHER - Revision : 4 |
2014-11-16 | Bash environment variable injection attempt RuleID : 32042 - Type : OS-OTHER - Revision : 4 |
2014-10-01 | Bash environment variable injection attempt RuleID : 32041-community - Type : OS-OTHER - Revision : 4 |
2014-11-16 | Bash environment variable injection attempt RuleID : 32041 - Type : OS-OTHER - Revision : 4 |
2014-10-01 | Bash environment variable injection attempt RuleID : 32039-community - Type : OS-OTHER - Revision : 3 |
2014-11-16 | Bash environment variable injection attempt RuleID : 32039 - Type : OS-OTHER - Revision : 3 |
2014-10-01 | Bash environment variable injection attempt RuleID : 32038-community - Type : OS-OTHER - Revision : 3 |
2014-11-16 | Bash environment variable injection attempt RuleID : 32038 - Type : OS-OTHER - Revision : 3 |
2014-09-25 | Malicious DHCP server bash environment variable injection attempt RuleID : 31985-community - Type : OS-OTHER - Revision : 6 |
2014-11-16 | Malicious DHCP server bash environment variable injection attempt RuleID : 31985 - Type : OS-OTHER - Revision : 6 |
2014-09-25 | Bash CGI environment variable injection attempt RuleID : 31978-community - Type : OS-OTHER - Revision : 5 |
2014-11-16 | Bash CGI environment variable injection attempt RuleID : 31978 - Type : OS-OTHER - Revision : 5 |
2014-09-25 | Bash CGI environment variable injection attempt RuleID : 31977-community - Type : OS-OTHER - Revision : 5 |
2014-11-16 | Bash CGI environment variable injection attempt RuleID : 31977 - Type : OS-OTHER - Revision : 5 |
Nessus® Vulnerability Scanner
id | Description |
---|---|
2017-12-04 | Name: The remote host is missing a vendor-supplied security patch. File: check_point_gaia_sk102673.nasl - Type: ACT_GATHER_INFO |
2017-03-30 | Name: The remote OracleVM host is missing a security update. File: oraclevm_OVMSA-2017-0050.nasl - Type: ACT_GATHER_INFO |
2016-02-02 | Name: The remote Solaris system is missing a security patch for third-party software. File: solaris11_bash_20141031_2.nasl - Type: ACT_GATHER_INFO |
2015-12-30 | Name: The remote VMware ESX host is missing a security-related patch. File: vmware_VMSA-2014-0010_remote.nasl - Type: ACT_GATHER_INFO |
2015-08-25 | Name: The remote IBM Storwize V7000 Unified device is affected by multiple vulnerab... File: ibm_storwize_1_5_0_4.nasl - Type: ACT_GATHER_INFO |
2015-04-06 | Name: The remote web server is affected by a remote code execution vulnerability. File: bash_cve_2014_6278.nasl - Type: ACT_ATTACK |
2015-03-30 | Name: The remote Mandriva Linux host is missing one or more security updates. File: mandriva_MDVSA-2015-164.nasl - Type: ACT_GATHER_INFO |
2015-03-26 | Name: The remote Debian host is missing a security update. File: debian_DLA-63.nasl - Type: ACT_GATHER_INFO |
2015-01-19 | Name: The remote Solaris system is missing a security patch for third-party software. File: solaris11_bash_20141031.nasl - Type: ACT_GATHER_INFO |
2014-12-22 | Name: The remote device is affected by multiple vulnerabilities. File: juniper_space_jsa10648.nasl - Type: ACT_GATHER_INFO |
2014-11-26 | Name: The remote Cisco TelePresence Conductor device is affected by a command injec... File: cisco_telepresence_conductor_CSCur02103.nasl - Type: ACT_GATHER_INFO |
2014-11-13 | Name: The remote host is affected by a code injection vulnerability known as Shells... File: mcafee_ngfw_SB10085.nasl - Type: ACT_GATHER_INFO |
2014-11-12 | Name: The remote host is affected by a code injection vulnerability known as Shells... File: mcafee_web_gateway_sb10085.nasl - Type: ACT_GATHER_INFO |
2014-11-12 | Name: The remote host has an application installed that is affected by multiple vul... File: vmware_vcenter_converter_2014-0010.nasl - Type: ACT_GATHER_INFO |
2014-11-11 | Name: The remote host is missing a vendor-supplied security patch. File: cisco_cups_CSCur05454.nasl - Type: ACT_GATHER_INFO |
2014-11-11 | Name: The remote host is affected by a code injection vulnerability known as Shells... File: mcafee_email_gateway_SB10085.nasl - Type: ACT_GATHER_INFO |
2014-11-08 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2014-1294.nasl - Type: ACT_GATHER_INFO |
2014-11-08 | Name: The remote Red Hat host is missing one or more security updates. File: redhat-RHSA-2014-1311.nasl - Type: ACT_GATHER_INFO |
2014-11-08 | Name: The remote Red Hat host is missing a security update. File: redhat-RHSA-2014-1354.nasl - Type: ACT_GATHER_INFO |
2014-11-06 | Name: The remote host has a virtualization appliance installed that is affected by ... File: vcenter_operations_manager_vmsa_2014-0010.nasl - Type: ACT_GATHER_INFO |
2014-11-04 | Name: The remote host has a device management application installed that is affecte... File: vmware_workspace_portal_vmsa2014-0010.nasl - Type: ACT_GATHER_INFO |
2014-11-03 | Name: The remote security device is missing a vendor-supplied security patch. File: cisco-sa-CSCur01959-asa-cx.nasl - Type: ACT_GATHER_INFO |
2014-11-03 | Name: The management application installed on the remote host is affected by a comm... File: cisco-sa-CSCur01959-prsm.nasl - Type: ACT_GATHER_INFO |
2014-11-03 | Name: The remote SIP server uses scripts that allow remote command execution via Sh... File: shellshock_sip_invite.nasl - Type: ACT_ATTACK |
2014-11-03 | Name: The remote host is affected by a command injection vulnerability. File: vmware_nsx_vmsa_2014_0010.nasl - Type: ACT_GATHER_INFO |