Novell Home

My Favorites

Close

Please to see your favorites.

Local privilege escalation vulnerability in ZENworks 7

This document (7012147) is provided subject to the disclaimer at the end of this document.

Environment

Novell ZENworks Desktop Management 7.1

Situation

Two vulnerabilities were discovered within the ZENworks suite which affects ZenRem32.exe (Remote Management Agent 7.0.1.1) and wm.exe (Workstation Manager Service 7.0.1.2). Exploitation of this vulnerability can result in a local privilege escalation and code execution under the SYSTEM privilege.

Resolution

A patch has been released to address this issue, and is available from http://download.novell.com/Download?buildid=hT-LlTRPOfw~

Cause

The following two paths are used by ZENworks to launch ZenRem32.exe and wm.exe during system start-up.

"C:\Program Files\Novell\ZENworks\RemoteManagement\RMAgent\ZenRem32.exe"
"C:\Program Files\Novell\ZENworks\wm.exe"


The underlying source code which launches these executables via command line through the provided path does not correctly double quote the path prior to execution.


Status

Security Alert

Additional Information

This vulnerability was discovered and reported to Novell by EMERGING DEFENSE, LLC

Identifiers: 
CVE-2013-1092

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7012147
  • Creation Date:15-APR-13
  • Modified Date:26-APR-13
    • NovellZENworks Desktop Management

Did this document solve your problem? Provide Feedback