First published: Thu Jul 26 2012(Updated: )
Directory traversal vulnerability in the LaunchProcess function in the LaunchHelp.HelpLauncher.1 ActiveX control in LaunchHelp.dll in AdminStudio in Novell ZENworks Configuration Management (ZCM) 10.2, 10.3, and 11 SP1 allows remote attackers to execute arbitrary commands via a pathname in the first argument.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus ZENworks Configuration Management | =11-sp1 | |
Micro Focus ZENworks Configuration Management | =10.2 | |
Micro Focus ZENworks Configuration Management | =10.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2657 has a high severity rating, allowing remote attackers to execute arbitrary commands on affected systems.
To fix CVE-2011-2657, it is recommended to apply the latest security patches or updates provided by Novell for ZENworks Configuration Management.
CVE-2011-2657 affects versions 10.2, 10.3, and 11 SP1 of Novell ZENworks Configuration Management.
CVE-2011-2657 is classified as a directory traversal vulnerability in an ActiveX control.
Yes, CVE-2011-2657 can be exploited remotely, allowing attackers to manipulate the system via crafted pathnames.