Environment
Novell ZENworks Desktop Management 7.1
Situation
Two vulnerabilities were discovered within the ZENworks suite which affects
ZenRem32.exe (Remote Management Agent 7.0.1.1) and wm.exe (Workstation Manager
Service 7.0.1.2). Exploitation of this vulnerability can result in a local
privilege escalation and code execution under the SYSTEM privilege.
Resolution
A patch has been released to address this issue, and is available from https://download.novell.com/Download?buildid=hT-LlTRPOfw~
Cause
The following two paths are used by ZENworks to launch ZenRem32.exe and wm.exe
during system start-up.
"C:\Program Files\Novell\ZENworks\RemoteManagement\RMAgent\ZenRem32.exe"
"C:\Program Files\Novell\ZENworks\wm.exe"
The underlying source code which launches these executables via command line through the provided path does not correctly double quote the path prior to execution.
"C:\Program Files\Novell\ZENworks\RemoteManagement\RMAgent\ZenRem32.exe"
"C:\Program Files\Novell\ZENworks\wm.exe"
The underlying source code which launches these executables via command line through the provided path does not correctly double quote the path prior to execution.
Status
Security AlertAdditional Information
This vulnerability was discovered and reported to Novell by EMERGING DEFENSE, LLC
Identifiers:
CVE-2013-1092
Identifiers:
CVE-2013-1092