Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA1 =========================================================================== AUSCERT Security Bulletin ASB-2010.0187 A vulnerability has been identified in Novell ZENworks 6 August 2010 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Novell ZENworks for Servers 3.0.2 - ZfS3.0.2 Novell ZENworks 7 Server Management Support Pack 1 - ZSM7 SP1 Novell ZENworks for Desktops 4 - ZfD4 Remote Management Novell ZENworks for Desktops 4.0.1 - ZfD4.0.1 Remote Management Novell ZENworks 7 Desktop Management Support Pack 1 - ZDM7 SP1 Remote Management Operating System: Windows Linux variants Netware Impact/Access: Unauthorised Access -- Existing Account Resolution: Mitigation Member content until: Sunday, September 5 2010 OVERVIEW A vulnerability has been identified in Novell ZENworks Desktop Management and Novell ZENworks Server Management. IMPACT The vendor has provided the following information regarding the impact of this vulnerability: "A hacker can reuse the Remote Management password information on the local managed device to authenticate into a remote session on another managed device when both the managed devices are configured with the same Remote Management password." [1] MITIGATION No updates are currently available to correct this vulnerability, however the vendor has provided the following mitigation strategies: "1. Disable password mode of authentication in the Remote Management policy, if its not being used. The property is disabled by default in the policy. 2. Distribute a common password via NAL or TED only in a trusted environment." [1] REFERENCES [1] Security vulnerability with Remote Management password authentication http://www.novell.com/support/viewContent.do?externalId=7006557&sliceId=1 AusCERT has made every effort to ensure that the information contained in this document is accurate. However, the decision to use the information described is the responsibility of each user or organisation. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: http://www.auscert.org.au/render.html?it=1967 iD8DBQFMW5Ap/iFOrG6YcBERAnccAJ4gxBj0K3R0T1fGzF5d9xBKcaOpngCfTfem ulDfY9vjClkEhwtkaYs/Dbk= =wQiX -----END PGP SIGNATURE-----