CVE-2014-4509
https://notcve.org/view.php?id=CVE-2014-4509
The MKDQUOTESAFE function in the Fan-out driver scripts in Fan-Out Platform Services in Novell Identity Manager (aka IDM) 4.0.2 allows local users to execute arbitrary commands by leveraging eDirectory POSIX attribute changes to insert shell metacharacters. La función MKDQUOTESAFE en la secuencias de comandos del controlador Fan-out en Fan-Out Platform Services en Novell Identity Manager (también conocido como IDM) 4.0.2 permite a usuarios locales ejecutar comandos arbitrarios mediante el aprovechamiento de cambios de atributos de eDirectory POSIX para insertar metacaracteres de shell. • http://download.novell.com/Download?buildid=5XLmBl54_Rg~ http://www.securityfocus.com/bid/68139 •
CVE-2010-3264
https://notcve.org/view.php?id=CVE-2010-3264
The engine installer in Novell Identity Manager (aka IDM) 3.6.1 stores admin tree credentials in /tmp/idmInstall.log, which allows local users to obtain sensitive information by reading this file. El motor de instalación en Novell Identity Manager (también conocido como IDM) v3.6.1 almacena las credenciales del árbol de administrador en p/idmInstall.log, lo que permite a usuarios locales obtener información mediante la lectura de este archivo. • http://secunia.com/advisories/41194 http://www.novell.com/support/viewContent.do?externalId=7006705 http://www.vupen.com/english/advisories/2010/2226 • CWE-255: Credentials Management Errors •
CVE-2007-6625
https://notcve.org/view.php?id=CVE-2007-6625
The Platform Service Process (asampsp) in Fan-Out Driver Platform Services for Novell Identity Manager (IDM) 3.5.1 allows remote attackers to cause a denial of service (daemon crash) via unspecified network traffic that triggers a syslog message containing invalid format string specifiers, as demonstrated by a Nessus scan. El Platform Service Process (asampsp) de Fan-Out Driver Platform Services para Novell Identity Manager (IDM) 3.5.1 permite a atacantes remotos provocar una denegación de servicio (caída de demonio) mediante tráfico de red no especificado que dispara un mensaje de syslog conteniendo especificadores de formato de cadena inválidos, como se demuestra con un análisis Nessus. • http://osvdb.org/40104 http://secunia.com/advisories/28237 http://securitytracker.com/id?1019144 http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5007560.html http://www.securityfocus.com/bid/27028 http://www.vupen.com/english/advisories/2007/4311 https://exchange.xforce.ibmcloud.com/vulnerabilities/39206 • CWE-134: Use of Externally-Controlled Format String •
CVE-2007-4526
https://notcve.org/view.php?id=CVE-2007-4526
The Client Login Extension (CLE) in Novell Identity Manager before 3.5.1 20070730 stores the username and password in a local file, which allows local users to obtain sensitive information by reading this file. La Client Login Extension (CLE) de Novell Identity Manager versiones anteriores a 3.5.1 20070730 almacena nombre de usuario y contraseña en un fichero local, lo cual permite a usuarios locales obtener información confidencial leyendo este fichero. • http://osvdb.org/37320 http://secunia.com/advisories/26555 http://securitytracker.com/id?1018602 http://www.securityfocus.com/bid/25420 http://www.vupen.com/english/advisories/2007/2957 https://exchange.xforce.ibmcloud.com/vulnerabilities/36215 https://secure-support.novell.com/KanisaPlatform/Publishing/177/3329402_f.SAL_Public.html • CWE-255: Credentials Management Errors •
CVE-2006-4803
https://notcve.org/view.php?id=CVE-2006-4803
The Fan-Out Linux and UNIX receiver scripts in Novell Identity Manager (IDM) 3.0.1 allows local users to execute arbitrary commands via unspecified vectors involving certain environment variables and "code injection." La secuencia de comandos del receptor de fan-out de linux y UNIX permite a un usuario local ejecutar comandos de su elección a través de vectores sin especificar que implican ciertas varibles de entorno e "inyecciòn de código". • http://secunia.com/advisories/21888 http://securitytracker.com/id?1016853 http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974421.htm http://www.securityfocus.com/bid/20016 http://www.vupen.com/english/advisories/2006/3607 •