PRL-2010-12

#####################################################################################

Application:   Novell Zenworks Desktop Management Linux TFTPD Remote Code Execution Vulnerability

Platforms:   SLES 10 SP3

Exploitation:   Remote code execution

CVE Number:

Novell TID:   7007321

ZDI number:   ZDI-10-285

Author:   Francis Provencher (Protek Research Lab’s)

WebSite:   http://www.protekresearchlab.com/

#####################################################################################

1) Introduction
2) Report Timeline
3) Technical details

#####################################################################################

===============
1) Introduction
===============

Novell, Inc. is a global software and services company based in Waltham, Massachusetts. The company specializes in

enterprise operating systems, such as SUSE

Linux Enterprise and Novell NetWare; identity, security, and systems management solutions; and collaboration solutions,

such as Novell Groupwise and Novell

Pulse.

Novell was instrumental in making the Utah Valley a focus for technology and software development. Novell technology

contributed to the emergence of local

area networks, which displaced the dominant mainframe computing model and changed computing worldwide. Today, a primary

focus of the company is on developing

open source software for enterprise clients.

(http://en.wikipedia.org/wiki/Novell)

#####################################################################################

============================
2) Report Timeline
============================

2010-07-20 – Vulnerability reported to vendor
2010-12-13 – Coordinated public release of advisory

#####################################################################################

====================
3) Technical details
====================

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks

Desktop Management. Authentication is not required to exploit this vulnerability.

The flaw exists within the tftpd server component which listens by default on UDP port 69. When handling the filename in

a Read Request (0x01) packet type the process blindly copies user supplied data into a fixed-length buffer on the stack.

A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the tftpd server

process.

###############################################################################