First published: Fri Jul 07 2006(Updated: )
SQL injection vulnerability in checkprofile.asp in (1) PatchLink Update Server (PLUS) before 6.1 P1 and 6.2.x before 6.2 SR1 P1 and (2) Novell ZENworks 6.2 SR1 and earlier, allows remote attackers to execute arbitrary SQL commands via the agentid parameter.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus ZENworks | <=6.2 | |
Lumension PatchLink Update Server | =6.2.0.181 | |
Lumension PatchLink Update Server | =6.1 | |
Lumension PatchLink Update Server | =6.2.0.189 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2006-3430 is classified as high due to the potential for remote attackers to execute arbitrary SQL commands.
To fix CVE-2006-3430, upgrade to Lumension PatchLink Update Server version 6.1 P1 or 6.2 SR1 P1, or Novell ZENworks version 6.2 SR1 or later.
Affected versions of Lumension PatchLink Update Server for CVE-2006-3430 include 6.1 prior to P1 and 6.2.0.181 and 6.2.0.189 prior to SR1 P1.
CVE-2006-3430 impacts Novell ZENworks versions 6.2 SR1 and earlier.
CVE-2006-3430 is identified as an SQL injection vulnerability that allows remote attackers to manipulate SQL commands using the agentid parameter.