CVE-2014-3460
Novell NetIQ Sentinel Agent Manager NQMcsVarSet DumpToFile Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Directory traversal vulnerability in the DumpToFile method in the NQMcsVarSet ActiveX control in Agent Manager in NetIQ Sentinel allows remote attackers to create arbitrary files, and consequently execute arbitrary code, via a crafted pathname.
Vulnerabilidad de salto de directorio en el método DumpToFile en el control NQMcsVarSet ActiveX en Agent Manager en NetIQ Sentinel permite a atacantes remotos crear archivos arbitrarios, y como consecuencia ejecutar código arbitrario, a través de un nombre de ruta manipulado.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell NetIQ. User interaction is required to exploit this vulnerability in that the target must visit a malicious page or open a malicious file.
The specific flaw exists within the NQMcsVarSet ActiveX control. The control exposes the DumpToFile method. The method does not properly sanitize the path for the filename, allowing for directory traversal. An attacker can leverage this vulnerability to write files under the context of the current process, which can then be used to execute code under the context of the current user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2014-05-13 CVE Reserved
- 2014-05-19 CVE Published
- 2024-08-06 CVE Updated
- 2024-08-23 EPSS Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://secunia.com/advisories/58635 | Third Party Advisory | |
http://www.novell.com/support/kb/doc.php?id=7015183 | X_refsource_confirm | |
http://www.securityfocus.com/bid/67487 | Vdb Entry | |
http://www.securitytracker.com/id/1030434 | Vdb Entry | |
http://zerodayinitiative.com/advisories/ZDI-14-134 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Microfocus Search vendor "Microfocus" | Sentinel Search vendor "Microfocus" for product "Sentinel" | - | - |
Affected
| ||||||
Microfocus Search vendor "Microfocus" | Sentinel Agent Manager Search vendor "Microfocus" for product "Sentinel Agent Manager" | - | - |
Affected
|