First published: Wed Jan 09 2008(Updated: )
STEngine.exe 3.5.0.20 in Novell ZENworks Endpoint Security Management (ESM) 3.5, and other ESM versions before 3.5.0.82, dynamically creates scripts in a world-writable directory when generating diagnostic reports, which allows local users to gain privileges, as demonstrated by creating a cmd.exe binary in the diagnostic report directory.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell ZENworks | <=3.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5665 is considered a high severity vulnerability due to the potential for local privilege escalation.
To fix CVE-2007-5665, update Novell ZENworks Endpoint Security Management to version 3.5.0.82 or later.
Exploiting CVE-2007-5665 allows local users to gain elevated privileges on affected systems.
CVE-2007-5665 affects Novell ZENworks Endpoint Security Management versions up to 3.5.0.20.
CVE-2007-5665 is a local vulnerability as it requires access to the system by an authenticated user.