First published: Fri Jul 07 2006(Updated: )
FastPatch for (a) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1, and (b) Novell ZENworks 6.2 SR1 and earlier, does not require authentication for dagent/proxyreg.asp, which allows remote attackers to list, add, or delete PatchLink Distribution Point (PDP) proxy servers via modified (1) List, (2) Proxy, or (3) Delete parameters.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Lumension PatchLink Update Server | =6.1 | |
Lumension PatchLink Update Server | =6.2.0.181 | |
Lumension PatchLink Update Server | =6.2.0.189 | |
Novell ZENworks | <=6.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-3425 has a severity rating that indicates it can be exploited to gain unauthorized access to PatchLink Distribution Point proxy servers.
To fix CVE-2006-3425, update to Lumension PatchLink Update Server version 6.1 P1 or 6.2 SR1 P1, or a later version.
CVE-2006-3425 allows remote attackers to list, add, or delete PatchLink Distribution Point proxy servers without authentication.
CVE-2006-3425 affects Lumension PatchLink Update Server versions prior to 6.1 P1 and 6.2.x before 6.2 SR1 P1, as well as Novell ZENworks versions up to 6.2 SR1.
CVE-2006-3425 does not require authentication for accessing the vulnerable components, making it easier for attackers to exploit.