Check Point Reference: | CPAI-2011-126 |
Date Published: | 5 Jan 2012 |
Severity: | Critical |
Last Updated: | Monday 25 November, 2024 |
Source: | |
Protection Provided by: |
IPS-1 |
Who is Vulnerable? | Novell ZENworks Handheld Management 7.0.2.61213 and prior |
Vulnerability Description | A directory traversal vulnerability has been reported in Novell ZENworks Handheld Management. |
Vulnerability Details | The vulnerability is due to insufficient sanitization while handling malformed incoming messages. A remote attacker may leverage this flaw by sending a specially crafted request to an affected server. Successful exploitation would allow an attacker to create files in an arbitrary location on the target server, possibly resulting in full system compromise of a target system. |
The protection will block requests to the Novell ZENWorks management server which attempt to transfer files with '..' characters in their names.
1. In the IPS-1 Policy Manager, click on the Protection tab.
2. In the Protection tree, click Application Intelligence > Enterprise Software, and select the Novell Various Vulnerabilities protection group.
3. Click Novell ZENworks Handheld Management Upload Directory Traversal.
4. In the configuration pane, under Settings, check Active.
5. Click on Install Policy.
Upon attack, the following entries will be logged:
Alert Name: Novel Enterprise Software
Description: Novell ZENworks Handheld Management Upload Directory Traversal