Check Point Advisories

Novell ZENworks Remote Management Buffer Overflow (CVE-2005-1543)

Check Point Reference: CPAI-2005-246
Date Published: 25 Oct 2009
Severity: Critical
Last Updated: Monday 08 April, 2013
Source:
Industry Reference:CVE-2005-1543
Protection Provided by:

Security Gateway
R81, R80, R77, R75

Who is Vulnerable?
Vulnerability Description ZENworks is a resource management solution developed by Novell. The product provides system administrators the capability of remote management of networked computers. The software is divided into two major components, the management server and the management agent. The central management server collects information from and dispatches management operations to the management agents running on managed computers. Since management tasks are privileged operations, the management server must authenticate itself to an agent each time it initializes a new session. The management agent listens on port 1761/TCP for incoming requests. The two components communicate using a proprietary protocol. There exists a vulnerability in the authentication mechanism of the Novell ZENWorks suite. The flaw is caused by an insufficient boundary checking of authentication data. This vulnerability can be remotely exploited without credentials to execute arbitrary code on the target system within the system/root context. In case of an attack, aimed at creating a denial of service condition, the affected service will terminate. If the service is not configured to restart automatically, then the Novell ZENworks Remote Management functionality will be unavailable until the server is restarted manually. In case of an attack where code injection and execution is successful, the behavior of the system is dependent on the intended purpose the injected code. Any code injected into the vulnerable component would execute in the security context of the service process, normally System level.

Protection Overview

This protection will detect and block attempts to exploit this vulnerability

In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.

Security Gateway R80 / R77 / R75

  1. In the IPS tab, click Protections and find the Novell ZENworks Remote Management Buffer Overflow protection using the Search tool and Edit the protection's settings.
  2. Install policy on all Security Gateways.

This protection's log will contain the following information:

Attack Name:  Application Servers Protection Violation.
Attack Information:  Novell ZENworks Remote Management buffer overflow

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK