Novell File Reporter Agent XML Parsing Remote Code Execution

critical Nessus Network Monitor Plugin ID 5907

Synopsis

The remote host contains a service that is vulnerable to a remote buffer overflow attack.

Description

Novell File Reporter Agent, a tool for identifying files stored on the network, is installed on the remote host.

Versions of Novell File Reporter Agent earlier than 1.0.4.2 are potentially affected by a buffer overflow vulnerability because the service, which listens by default on TCP port 3037, blindly copies user-supplied data into a fixed-length buffer on the stack when handling the contents of an XML tag. An unauthenticated remote attacker who can access the agent service can leverage this issue to execute arbitrary code under the context of the user running the affected application.

Solution

Upgrade to Novell File Reporter 1.0.2, which includes NFR Agent version 1.0.4.2.

See Also

http://www.zerodayinitiative.com/advisories/ZDI-11-116

http://archives.neohapsis.com/archives/bugtraq/2011-04/0034.html

http://download.novell.com/Download?buildid=rCAgCcbPH9s~

Plugin Details

Severity: Critical

ID: 5907

Family: Generic

Published: 5/6/2011

Updated: 3/6/2019

Nessus ID: 53536

Risk Information

VPR

Risk Factor: High

Score: 7.4

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 8.3

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS v3

Risk Factor: Critical

Base Score: 9.8

Temporal Score: 9.1

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:novell:file_reporter

Patch Publication Date: 4/4/2011

Vulnerability Publication Date: 4/4/2011

Exploitable With

CANVAS (D2ExploitPack)

Reference Information

CVE: CVE-2011-0994

BID: 47144