Check Point Advisories

Novell ZENworks Handheld Management Upload Directory Traversal

Check Point Reference: CPAI-2011-126
Date Published: 5 Jan 2012
Severity: Critical
Last Updated: Thursday 28 March, 2024
Source:
Protection Provided by:

IPS-1
IPS-1

  • IPS-1 NGX R65

  • Who is Vulnerable? Novell ZENworks Handheld Management 7.0.2.61213 and prior
    Vulnerability Description A directory traversal vulnerability has been reported in Novell ZENworks Handheld Management.
    Vulnerability DetailsThe vulnerability is due to insufficient sanitization while handling malformed incoming messages. A remote attacker may leverage this flaw by sending a specially crafted request to an affected server. Successful exploitation would allow an attacker to create files in an arbitrary location on the target server, possibly resulting in full system compromise of a target system.

    Protection Overview

    The protection will block requests to the Novell ZENWorks management server which attempt to transfer files with '..' characters in their names.

    IPS-1 NGX R65 & IPS-1

    1. In the IPS-1 Policy Manager, click on the Protection tab.
    2. In the Protection tree, click Application Intelligence > Enterprise Software, and select the Novell Various Vulnerabilities protection group.
    3. Click Novell ZENworks Handheld Management Upload Directory Traversal.
    4. In the configuration pane, under Settings, check Active.
    5. Click on Install Policy.

    Upon attack, the following entries will be logged:

    Alert Name: Novel Enterprise Software
    Description: Novell ZENworks Handheld Management Upload Directory Traversal

    ×
      Feedback
    This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
    OK