Novell Sentinel Log Manager Multiple Vulnerabilities


Description   Novell has acknowledged multiple vulnerabilities in Novell Sentinel Log Manager, which can be exploited by malicious users to disclose sensitive information, manipulate certain data, cause a DoS (Denial of Service), and compromise a vulnerable system.
1) Input passed via the "filename" parameter to novelllogmanager/FileDownload is not properly sanitised before being used. This can be exploited to download arbitrary files from local resources via directory traversal sequences.
This vulnerability is confirmed in version 1.2.0.1_938. Other versions may also be affected.
2) Some errors exist in the bundled version of Sun Java.
For more information:
SA44784
     
Vulnerable Products   Vulnerable Software:
Novell Sentinel Log Manager 1.x
     
Solution   Update to version 1.2.0.2. http://download.novell.com/Download?buildid=QNHQBIif2mk~
     
CVE   CVE-2011-5028
CVE-2011-3378
CVE-2011-2901
CVE-2011-2694
CVE-2011-2689
CVE-2011-2525
CVE-2011-2522
CVE-2011-2519
CVE-2011-2517
CVE-2011-2495
CVE-2011-2492
CVE-2011-2491
CVE-2011-2482
CVE-2011-2213
CVE-2011-2192
CVE-2011-2022
CVE-2011-1936
CVE-2011-1780
CVE-2011-1776
CVE-2011-1763
CVE-2011-1746
CVE-2011-1745
CVE-2011-1678
CVE-2011-1593
CVE-2011-1577
CVE-2011-1576
CVE-2011-1573
CVE-2011-1521
CVE-2011-1495
CVE-2011-1494
CVE-2011-1182
CVE-2011-1172
CVE-2011-1171
CVE-2011-1170
CVE-2011-1166
CVE-2011-1163
CVE-2011-1093
CVE-2011-1080
CVE-2011-1079
CVE-2011-1078
CVE-2011-1044
CVE-2011-1015
CVE-2011-0726
CVE-2011-0711
CVE-2011-0695
CVE-2010-4649
CVE-2010-3493
CVE-2010-2059
CVE-2010-0787
CVE-2010-0547
CVE-2009-3720
     
References   Andrea Fabrizi:
http://archives.neohapsis.com/archives/fulldisclosure/2011-12/0368.html
Novell:
http://www.novell.com/documentation/novelllogmanager12/log_manager_readme/data/log_manager_readme.html
     
Vulnerability Manager Detection   No
     
IPS Protection  
ASQ Engine alarm Available Since
Misc : Directory traversal - parameter starting with ../
3.2.0
Directory traversal using ..\..
3.2.0
Directory traversal
3.2.0
Directory traversal backward root folder
3.2.0
     


 
 
 
 
 Risk level 
High 

 Vulnerability First Public Report Date 
2011-12-19 

 Target Type 
Server 

 Possible exploit 
Remote