First published: Mon Dec 24 2012(Updated: )
Directory traversal vulnerability in the set_log_config function in regclnt.dll in unifid.exe in NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 allows remote authenticated users to create or overwrite arbitrary files via directory traversal sequences in a log pathname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Microfocus Privileged User Manager | =2.3.0 | |
Microfocus Privileged User Manager | =2.3.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-5931 is classified as a medium severity vulnerability due to its potential to allow unauthorized file creation or overwriting.
To fix CVE-2012-5931, you should upgrade to NetIQ Privileged User Manager version 2.3.1 HF2 or later.
CVE-2012-5931 affects users of NetIQ Privileged User Manager versions before 2.3.1 HF2, specifically 2.3.0 and 2.3.1.
CVE-2012-5931 is a directory traversal vulnerability that allows for unauthorized access to the file system.
Yes, remote authenticated users can exploit CVE-2012-5931 to create or overwrite arbitrary files.