CERTA-2004-AVI-102

Vulnerability from certfr_avis - Published: - Updated:

Une vulnérabilité présente dans l'installation de Novell Netware 6.5 Support Pack 1.1 peut être exploitée par un utilisateur mal intentionné pour obtenir les privilèges de l'administrateur.

Description

Un utilisateur mal intentionné peut retrouver, par l'intermédiaire des fichiers journaux d'installation (NIOUTPUT.TXT, NI.LOG), les mots de passe de l'administrateur ayant effectué l'installation.

Solution

  • Sécuriser ou supprimer les deux fichiers journaux cités ci-dessus ;
  • changer les mots de passe de l'administrateur ayant effectué l'installation ;
  • utiliser la mise à jour Novell 6.5 Support Pack 1.1(b) pour les prochaines mises à jour (cf. section documentation).
None
Impacted products
Vendor Product Description
Novell N/A Novell Netware 6.5 OS Support Pack 1.1 ;
Novell N/A Novell Netware 6.5 Products Support Pack 1.1.
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Novell Netware 6.5 OS Support Pack 1.1 ;",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Novell",
          "scada": false
        }
      }
    },
    {
      "description": "Novell Netware 6.5 Products Support Pack 1.1.",
      "product": {
        "name": "N/A",
        "vendor": {
          "name": "Novell",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nUn utilisateur mal intentionn\u00e9 peut retrouver, par l\u0027interm\u00e9diaire des\nfichiers journaux d\u0027installation (NIOUTPUT.TXT, NI.LOG), les mots de\npasse de l\u0027administrateur ayant effectu\u00e9 l\u0027installation.\n\n## Solution\n\n-   S\u00e9curiser ou supprimer les deux fichiers journaux cit\u00e9s ci-dessus ;\n-   changer les mots de passe de l\u0027administrateur ayant effectu\u00e9\n    l\u0027installation ;\n-   utiliser la mise \u00e0 jour Novell 6.5 Support Pack 1.1(b) pour les\n    prochaines mises \u00e0 jour (cf. section documentation).\n",
  "cves": [],
  "links": [
    {
      "title": "Novell NetWare 6.5 OS SP1.1(b) :",
      "url": "http://support.novell.com/servlet/filedownload/sec/pub/nw65ossp1b.exe"
    },
    {
      "title": "Avis de s\u00e9curit\u00e9 Novell :",
      "url": "http://support.novell.com/cgi-bin/search/searchtid.cgi?/2968534.htm"
    },
    {
      "title": "Novell NetWare 6.5 Products SP1.1(b) :",
      "url": "http://support.novell.com/servlet/filedownload/sec/pub/nw65prodsp1b.exe"
    }
  ],
  "reference": "CERTA-2004-AVI-102",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2004-03-26T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "\u00c9l\u00e9vation de privil\u00e8ges"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 pr\u00e9sente dans l\u0027installation de Novell Netware 6.5\nSupport Pack 1.1 peut \u00eatre exploit\u00e9e par un utilisateur mal intentionn\u00e9\npour obtenir les privil\u00e8ges de l\u0027administrateur.\n",
  "title": "Vuln\u00e9rabilit\u00e9 sur Novell Netware 6.5",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Avis de s\u00e9curit\u00e9 Novell 2968534",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…