Secunia Security Advisory - A weakness has been reported in Novell ZENworks, which potentially can be exploited by malicious users to bypass certain security restrictions.
a1f4f51b8010ef41db915cd6b023a7f1ca74bc95896a8be8bbaa0b59da7fbae5
TITLE:
Novell ZENworks Remote-Diagnostics Access Control Weakness
SECUNIA ADVISORY ID:
SA17700
VERIFY ADVISORY:
http://secunia.com/advisories/17700/
CRITICAL:
Not critical
IMPACT:
Security Bypass
WHERE:
>From local network
SOFTWARE:
Novell ZENworks Desktop Management 6.x
http://secunia.com/product/4134/
Novell ZENworks for Desktops 4.x
http://secunia.com/product/1246/
Novell ZENworks for Servers 3
http://secunia.com/product/1247/
DESCRIPTION:
A weakness has been reported in Novell ZENworks, which potentially
can be exploited by malicious users to bypass certain security
restrictions.
The weakness is caused due to an access validation error that allows
regular users without the appropriate rights to access to the Remote
Diagnostics function using Console One.
The weakness has been reported in the following products:
* Novell ZENworks for Desktops 4.0.1
* Novell ZENworks for Servers 3.0.2
* Novell ZENworks 6.5 Desktop Management
SOLUTION:
The weakness has been fixed in ZENworks for Servers 3.0.2 IR4.
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972567.htm
PROVIDED AND/OR DISCOVERED BY:
Reported by vendor.
ORIGINAL ADVISORY:
http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098818.htm
----------------------------------------------------------------------
About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.
Subscribe:
http://secunia.com/secunia_security_advisories/
Definitions: (Criticality, Where etc.)
http://secunia.com/about_secunia_advisories/
Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.
----------------------------------------------------------------------