First published: Wed Sep 19 2012(Updated: )
nxapplet.jar in No Machine NX Web Companion 3.x and earlier does not properly verify the authenticity of updates, which allows user-assisted remote attackers to execute arbitrary code via a crafted (1) SiteUrl or (2) RedirectUrl parameter that points to a Trojan Horse client.zip update file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Nomachine Nx Web Companion | <=3.5.0-2 | |
Nomachine Nx Web Companion | =1.5.0-beta2 | |
Nomachine Nx Web Companion | =1.5.0-beta3 | |
Nomachine Nx Web Companion | =2.0.0-1 | |
Nomachine Nx Web Companion | =2.1.0-1 | |
Nomachine Nx Web Companion | =3.0.0-1 | |
Nomachine Nx Web Companion | =3.0.0-2 | |
Nomachine Nx Web Companion | =3.0.0-3 | |
Nomachine Nx Web Companion | =3.0.0-4 | |
Nomachine Nx Web Companion | =3.0.0-5 | |
Nomachine Nx Web Companion | =3.1.0-1 | |
Nomachine Nx Web Companion | =3.2.0-1 | |
Nomachine Nx Web Companion | =3.3.0-1 | |
Nomachine Nx Web Companion | =3.3.0-2 | |
Nomachine Nx Web Companion | =3.4.0-1 | |
Nomachine Nx Web Companion | =3.4.0-2 | |
Nomachine Nx Web Companion | =3.4.0-3 | |
Nomachine Nx Web Companion | =3.5.0-1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.