Vulnerability Name:

CVE-2013-1079 (CCN-83043)

Assigned:2013-03-22
Published:2013-03-22
Updated:2013-04-02
Summary:Directory traversal vulnerability in the ISCreateObject method in an ActiveX control in InstallShield\ISProxy.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.3 through 11.2 allows remote attackers to execute arbitrary local DLL files via a crafted web page that also calls the Initialize method.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:6.8 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P)
5.0 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-22
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2013-1079

Source: CCN
Type: Novell Document ID: 7011811
AdminStudio ISProxy Remote Code Execution Vulnerability

Source: CONFIRM
Type: Vendor Advisory
http://www.novell.com/support/kb/doc.php?id=7011811

Source: CCN
Type: BID-58664
Novell ZENWorks AdminStudio ISProxy 'ISProxy.dll' Activex Remote Code Execution Vulnerability

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-13-048/

Source: XF
Type: UNKNOWN
zenworks-cve20131079-code-exec(83043)

Source: CCN
Type: ZDI-13-048
Novell ZENWorks AdminStudio ISProxy ActiveX Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:10.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:10.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:10.3.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:11.1a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:11.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:zenworks_configuration_management:10.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:11:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_configuration_management:11.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell zenworks configuration management 10.3
    novell zenworks configuration management 10.3.1
    novell zenworks configuration management 10.3.2
    novell zenworks configuration management 10.3.3
    novell zenworks configuration management 11
    novell zenworks configuration management 11.1
    novell zenworks configuration management 11.1a
    novell zenworks configuration management 11.2
    novell zenworks configuration management 10.3
    novell zenworks configuration management 11
    novell zenworks configuration management 11.1