[Forgot Password]
Login  Register Subscribe

30430

 
 

423868

 
 

247768

 
 

909

 
 

194555

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Directory traversal vulnerability in the set_log_config function in regclnt.dll in unifid.exe in NetIQ Privileged User Manager

ID: oval:org.secpod.oval:def:9080Date: (C)2013-02-05   (M)2022-10-10
Class: VULNERABILITYFamily: windows




The host is installed with NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle directory traversal sequences in a log pathname. Successful exploitation allows remote authenticated users to create or overwrite arbitrary files.

Platform:
Microsoft Windows XP
Microsoft Windows Vista
Microsoft Windows 7
Microsoft Windows Server 2003
Microsoft Windows Server 2008
Microsoft Windows Server 2008 R2
Microsoft Windows Server 2012
Microsoft Windows 8
Product:
NetIQ Privileged User Manager
Reference:
CVE-2012-5931
CVE    1
CVE-2012-5931
CPE    3
cpe:/a:netiq:privileged_user_manager
cpe:/a:netiq:privileged_user_manager:2.3.1
cpe:/a:netiq:privileged_user_manager:2.3.0

© SecPod Technologies