2 results (0.005 seconds)

CVSS: 7.2EPSS: 0%CPEs: 6EXPL: 0

A privileged escalation vulnerability has been identified in Micro Focus ZENworks Configuration Management, affecting version 2020 Update 1 and all prior versions. The vulnerability could be exploited to gain unauthorized system privileges. Se ha identificado una vulnerabilidad de escalada de privilegios en Micro Focus ZENworks Configuration Management, afectando la versión 2020 Update 1 y a todas las versiones anteriores. La vulnerabilidad podría ser explotada para alcanzar privilegios del sistema no autorizados • https://support.microfocus.com/kb/doc.php?id=7025205 • CWE-863: Incorrect Authorization •

CVSS: 7.2EPSS: 0%CPEs: 1EXPL: 0

STEngine.exe 3.5.0.20 in Novell ZENworks Endpoint Security Management (ESM) 3.5, and other ESM versions before 3.5.0.82, dynamically creates scripts in a world-writable directory when generating diagnostic reports, which allows local users to gain privileges, as demonstrated by creating a cmd.exe binary in the diagnostic report directory. STEngine.exe 3.5.0.20 en Novell ZENworks Endpoint Security Management (ESM) 3.5, y otras versiones ESM anterior a 3.5.0.82, dinamicamente crea secuencias de comandos en un directorio con permisos de escritura para todos cuando genera informes de diagnóstico, lo cual permite a usuarios locales ganar privilegios, como se demostró con la creación del binario cmd.exe en el directorio de informes de diagnóstico. • http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=635 http://secunia.com/advisories/28351 http://www.securityfocus.com/bid/27146 http://www.securitytracker.com/id?1019155 http://www.vupen.com/english/advisories/2008/0044 • CWE-264: Permissions, Privileges, and Access Controls •