Check Point Reference: | CPAI-2005-246 |
Date Published: | 25 Oct 2009 |
Severity: | Critical |
Last Updated: | Monday 08 April, 2013 |
Source: | |
Industry Reference: | CVE-2005-1543 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | ZENworks is a resource management solution developed by Novell. The product provides system administrators the capability of remote management of networked computers. The software is divided into two major components, the management server and the management agent. The central management server collects information from and dispatches management operations to the management agents running on managed computers. Since management tasks are privileged operations, the management server must authenticate itself to an agent each time it initializes a new session. The management agent listens on port 1761/TCP for incoming requests. The two components communicate using a proprietary protocol. There exists a vulnerability in the authentication mechanism of the Novell ZENWorks suite. The flaw is caused by an insufficient boundary checking of authentication data. This vulnerability can be remotely exploited without credentials to execute arbitrary code on the target system within the system/root context. In case of an attack, aimed at creating a denial of service condition, the affected service will terminate. If the service is not configured to restart automatically, then the Novell ZENworks Remote Management functionality will be unavailable until the server is restarted manually. In case of an attack where code injection and execution is successful, the behavior of the system is dependent on the intended purpose the injected code. Any code injected into the vulnerable component would execute in the security context of the service process, normally System level. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: Application Servers Protection Violation.
Attack Information: Novell ZENworks Remote Management buffer overflow