This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Novell First view 2012-04-09
Product Zenworks Configuration Management Last view 2020-01-25
Version 11.1 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:novell:zenworks_configuration_management

Activity : Overall

Related : CVE

  Date Alert Description
7.5 2020-01-25 CVE-2012-6345

Novell ZENworks Configuration Management before 11.2.4 allows obtaining sensitive trace information.

6.1 2020-01-25 CVE-2012-6344

Novell ZENworks Configuration Management before 11.2.4 allows XSS.

9.8 2014-09-24 CVE-2014-7169

GNU Bash through 4.3 bash43-025 processes trailing strings after certain malformed function definitions in the values of environment variables, which allows remote attackers to write to files or possibly have unknown other impact via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution. NOTE: this vulnerability exists because of an incomplete fix for CVE-2014-6271.

9.8 2014-09-24 CVE-2014-6271

GNU Bash through 4.3 processes trailing strings after function definitions in the values of environment variables, which allows remote attackers to execute arbitrary code via a crafted environment, as demonstrated by vectors involving the ForceCommand feature in OpenSSH sshd, the mod_cgi and mod_cgid modules in the Apache HTTP Server, scripts executed by unspecified DHCP clients, and other situations in which setting the environment occurs across a privilege boundary from Bash execution, aka "ShellShock." NOTE: the original fix for this issue was incorrect; CVE-2014-7169 has been assigned to cover the vulnerability that is still present after the incorrect fix.

6.8 2013-11-02 CVE-2013-6347

Session fixation vulnerability in Novell ZENworks Configuration Management (ZCM) before 11.2.4 allows remote attackers to hijack web sessions via unspecified vectors.

6.8 2013-11-02 CVE-2013-6346

Cross-site request forgery (CSRF) vulnerability in the ZCC page in Novell ZENworks Configuration Management (ZCM) before 11.2.4 allows remote attackers to hijack the authentication of unspecified victims via unknown vectors.

10 2013-11-02 CVE-2013-6345

Unspecified vulnerability in the ZCC page in Novell ZENworks Configuration Management (ZCM) before 11.2.4 has unknown impact and attack vectors related to an "Application Exception."

4.3 2013-11-02 CVE-2013-6344

The ZCC page in Novell ZENworks Configuration Management (ZCM) before 11.2.4 allows attackers to conduct cross-frame scripting attacks via unknown vectors.

6.8 2013-03-29 CVE-2013-1079

Directory traversal vulnerability in the ISCreateObject method in an ActiveX control in InstallShield\ISProxy.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.3 through 11.2 allows remote attackers to execute arbitrary local DLL files via a crafted web page that also calls the Initialize method.

4.3 2012-04-11 CVE-2012-2223

The xplat agent in Novell ZENworks Configuration Management (ZCM) 10.3.x before 10.3.4 and 11.x before 11.2 enables the HTTP TRACE method, which might make it easier for remote attackers to conduct cross-site tracing (XST) attacks via unspecified vectors.

5 2012-04-09 CVE-2012-2215

Directory traversal vulnerability in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to read arbitrary files via an opcode 0x21 request.

10 2012-04-09 CVE-2011-3176

Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x4c request.

10 2012-04-09 CVE-2011-3175

Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x6c request.

CWE : Common Weakness Enumeration

%idName
18% (2) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer
18% (2) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
18% (2) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
18% (2) CWE-22 Improper Limitation of a Pathname to a Restricted Directory ('Path ...
9% (1) CWE-352 Cross-Site Request Forgery (CSRF)
9% (1) CWE-287 Improper Authentication
9% (1) CWE-200 Information Exposure

SAINT Exploits

Description Link
Novell ZENworks Configuration Management Preboot Service Opcode 4c Vulnerability More info here
Novell ZENworks Configuration Management Preboot Service Opcode 6c Vulnerability More info here
Bash environment variable code injection over HTTP More info here
Bash Environment Variable Handling Shell Command Injection Via CUPS More info here
ShellShock DHCP Server More info here

ExploitDB Exploits

id Description
35146 PHP 5.x Shellshock Exploit (bypass disable_functions)
35115 CUPS Filter Bash Environment Variable Code Injection
34879 OpenVPN 2.2.29 - ShellShock Exploit
34860 GNU bash 4.3.11 Environment Variable dhclient Exploit
34839 IPFire Cgi Web Interface Authenticated Bash Environment Variable Code Injecti...
34777 GNU bash Environment Variable Command Injection (MSF)

Information Assurance Vulnerability Management (IAVM)

id Description
2014-A-0142 GNU Bash Shell Code Execution Vulnerability
Severity: Category I - VMSKEY: V0054753

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
Date Description
2015-07-13 Linux.Trojan.ChinaZ outbound connection
RuleID : 34847 - Type : MALWARE-CNC - Revision : 3
2014-10-30 Bash environment variable injection attempt
RuleID : 32366-community - Type : OS-OTHER - Revision : 2
2014-12-02 Bash environment variable injection attempt
RuleID : 32366 - Type : OS-OTHER - Revision : 2
2014-10-24 Bash CGI environment variable injection attempt
RuleID : 32336-community - Type : OS-OTHER - Revision : 2
2014-11-25 Bash CGI environment variable injection attempt
RuleID : 32336 - Type : OS-OTHER - Revision : 2
2014-10-24 Bash CGI environment variable injection attempt
RuleID : 32335-community - Type : OS-OTHER - Revision : 2
2014-11-25 Bash CGI environment variable injection attempt
RuleID : 32335 - Type : OS-OTHER - Revision : 2
2014-10-03 Bash environment variable injection attempt
RuleID : 32069-community - Type : OS-OTHER - Revision : 3
2014-11-16 Bash environment variable injection attempt
RuleID : 32069 - Type : OS-OTHER - Revision : 3
2014-10-01 Bash environment variable injection attempt
RuleID : 32043-community - Type : OS-OTHER - Revision : 3
2014-11-16 Bash environment variable injection attempt
RuleID : 32043 - Type : OS-OTHER - Revision : 3
2014-10-01 Bash environment variable injection attempt
RuleID : 32042-community - Type : OS-OTHER - Revision : 4
2014-11-16 Bash environment variable injection attempt
RuleID : 32042 - Type : OS-OTHER - Revision : 4
2014-10-01 Bash environment variable injection attempt
RuleID : 32041-community - Type : OS-OTHER - Revision : 4
2014-11-16 Bash environment variable injection attempt
RuleID : 32041 - Type : OS-OTHER - Revision : 4
2014-10-01 Bash environment variable injection attempt
RuleID : 32039-community - Type : OS-OTHER - Revision : 3
2014-11-16 Bash environment variable injection attempt
RuleID : 32039 - Type : OS-OTHER - Revision : 3
2014-10-01 Bash environment variable injection attempt
RuleID : 32038-community - Type : OS-OTHER - Revision : 3
2014-11-16 Bash environment variable injection attempt
RuleID : 32038 - Type : OS-OTHER - Revision : 3
2014-09-25 Malicious DHCP server bash environment variable injection attempt
RuleID : 31985-community - Type : OS-OTHER - Revision : 6
2014-11-16 Malicious DHCP server bash environment variable injection attempt
RuleID : 31985 - Type : OS-OTHER - Revision : 6
2014-09-25 Bash CGI environment variable injection attempt
RuleID : 31978-community - Type : OS-OTHER - Revision : 5
2014-11-16 Bash CGI environment variable injection attempt
RuleID : 31978 - Type : OS-OTHER - Revision : 5
2014-09-25 Bash CGI environment variable injection attempt
RuleID : 31977-community - Type : OS-OTHER - Revision : 5
2014-11-16 Bash CGI environment variable injection attempt
RuleID : 31977 - Type : OS-OTHER - Revision : 5

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2017-12-04 Name: The remote host is missing a vendor-supplied security patch.
File: check_point_gaia_sk102673.nasl - Type: ACT_GATHER_INFO
2017-03-30 Name: The remote OracleVM host is missing a security update.
File: oraclevm_OVMSA-2017-0050.nasl - Type: ACT_GATHER_INFO
2016-02-02 Name: The remote Solaris system is missing a security patch for third-party software.
File: solaris11_bash_20141031_2.nasl - Type: ACT_GATHER_INFO
2015-12-30 Name: The remote VMware ESX host is missing a security-related patch.
File: vmware_VMSA-2014-0010_remote.nasl - Type: ACT_GATHER_INFO
2015-08-25 Name: The remote IBM Storwize V7000 Unified device is affected by multiple vulnerab...
File: ibm_storwize_1_5_0_4.nasl - Type: ACT_GATHER_INFO
2015-04-06 Name: The remote web server is affected by a remote code execution vulnerability.
File: bash_cve_2014_6278.nasl - Type: ACT_ATTACK
2015-03-30 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-164.nasl - Type: ACT_GATHER_INFO
2015-03-26 Name: The remote Debian host is missing a security update.
File: debian_DLA-63.nasl - Type: ACT_GATHER_INFO
2015-01-19 Name: The remote Solaris system is missing a security patch for third-party software.
File: solaris11_bash_20141031.nasl - Type: ACT_GATHER_INFO
2014-12-22 Name: The remote device is affected by multiple vulnerabilities.
File: juniper_space_jsa10648.nasl - Type: ACT_GATHER_INFO
2014-11-26 Name: The remote Cisco TelePresence Conductor device is affected by a command injec...
File: cisco_telepresence_conductor_CSCur02103.nasl - Type: ACT_GATHER_INFO
2014-11-13 Name: The remote host is affected by a code injection vulnerability known as Shells...
File: mcafee_ngfw_SB10085.nasl - Type: ACT_GATHER_INFO
2014-11-12 Name: The remote host is affected by a code injection vulnerability known as Shells...
File: mcafee_web_gateway_sb10085.nasl - Type: ACT_GATHER_INFO
2014-11-12 Name: The remote host has an application installed that is affected by multiple vul...
File: vmware_vcenter_converter_2014-0010.nasl - Type: ACT_GATHER_INFO
2014-11-11 Name: The remote host is missing a vendor-supplied security patch.
File: cisco_cups_CSCur05454.nasl - Type: ACT_GATHER_INFO
2014-11-11 Name: The remote host is affected by a code injection vulnerability known as Shells...
File: mcafee_email_gateway_SB10085.nasl - Type: ACT_GATHER_INFO
2014-11-08 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2014-1294.nasl - Type: ACT_GATHER_INFO
2014-11-08 Name: The remote Red Hat host is missing one or more security updates.
File: redhat-RHSA-2014-1311.nasl - Type: ACT_GATHER_INFO
2014-11-08 Name: The remote Red Hat host is missing a security update.
File: redhat-RHSA-2014-1354.nasl - Type: ACT_GATHER_INFO
2014-11-06 Name: The remote host has a virtualization appliance installed that is affected by ...
File: vcenter_operations_manager_vmsa_2014-0010.nasl - Type: ACT_GATHER_INFO
2014-11-04 Name: The remote host has a device management application installed that is affecte...
File: vmware_workspace_portal_vmsa2014-0010.nasl - Type: ACT_GATHER_INFO
2014-11-03 Name: The remote security device is missing a vendor-supplied security patch.
File: cisco-sa-CSCur01959-asa-cx.nasl - Type: ACT_GATHER_INFO
2014-11-03 Name: The management application installed on the remote host is affected by a comm...
File: cisco-sa-CSCur01959-prsm.nasl - Type: ACT_GATHER_INFO
2014-11-03 Name: The remote SIP server uses scripts that allow remote command execution via Sh...
File: shellshock_sip_invite.nasl - Type: ACT_ATTACK
2014-11-03 Name: The remote host is affected by a command injection vulnerability.
File: vmware_nsx_vmsa_2014_0010.nasl - Type: ACT_GATHER_INFO