-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2010.0187
          A vulnerability has been identified in Novell ZENworks
                               6 August 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Novell ZENworks for Servers 3.0.2 - ZfS3.0.2
                      Novell ZENworks 7 Server Management Support 
                        Pack 1 - ZSM7 SP1
                      Novell ZENworks for Desktops 4 - ZfD4 Remote 
                        Management
                      Novell ZENworks for Desktops 4.0.1 - ZfD4.0.1 Remote 
                        Management
                      Novell ZENworks 7 Desktop Management Support 
                        Pack 1 - ZDM7 SP1 Remote Management
Operating System:     Windows
                      Linux variants
                      Netware
Impact/Access:        Unauthorised Access -- Existing Account
Resolution:           Mitigation
Member content until: Sunday, September  5 2010

OVERVIEW

        A vulnerability has been identified in Novell ZENworks Desktop 
        Management and Novell ZENworks Server Management.


IMPACT

        The vendor has provided the following information regarding the impact
        of this vulnerability:
        
        "A hacker can reuse the Remote Management password information on the 
        local managed device to authenticate into a remote session on another 
        managed device when both the managed devices are configured with the 
        same Remote Management password." [1]


MITIGATION

        No updates are currently available to correct this vulnerability,
        however the vendor has provided the following mitigation strategies:
        
        "1. Disable password mode of authentication in the Remote Management 
        policy, if its not being used. The property is disabled by default in 
        the policy.
        
        2. Distribute a common password via NAL or TED only in a trusted 
        environment." [1]


REFERENCES

        [1] Security vulnerability with Remote Management password
            authentication
            http://www.novell.com/support/viewContent.do?externalId=7006557&sliceId=1

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFMW5Ap/iFOrG6YcBERAnccAJ4gxBj0K3R0T1fGzF5d9xBKcaOpngCfTfem
ulDfY9vjClkEhwtkaYs/Dbk=
=wQiX
-----END PGP SIGNATURE-----