First published: Fri Mar 29 2013(Updated: )
Novell Sentinel Log Manager before 1.2.0.3 allows remote attackers to create data retention policies via a crafted text/x-gwt-rpc request to novelllogmanager/datastorageservice.rpc, and allows remote authenticated Report Administrators to create data retention policies via a search-results "Save Query As" "Save As Retention Policy" action.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Sentinel Log Manager | <=1.2.0.2 | |
Novell Sentinel Log Manager | =1.0.0.4 | |
Novell Sentinel Log Manager | =1.0.0.5 | |
Novell Sentinel Log Manager | =1.1.0.0 | |
Novell Sentinel Log Manager | =1.1.0.1 | |
Novell Sentinel Log Manager | =1.1.0.2 | |
Novell Sentinel Log Manager | =1.2 | |
Novell Sentinel Log Manager | =1.2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-6534 has a medium severity rating due to the potential for remote policy creation by attackers.
To fix CVE-2012-6534, upgrade to Novell Sentinel Log Manager version 1.2.0.3 or later.
Versions of Novell Sentinel Log Manager prior to 1.2.0.3, including 1.0.0.4, 1.1.0.0, 1.1.0.1, 1.1.0.2, 1.2, and 1.2.0.1, are affected by CVE-2012-6534.
CVE-2012-6534 involves remote attackers exploiting crafted requests to create unauthorized data retention policies.
Yes, authenticated Report Administrators can also exploit CVE-2012-6534 to create data retention policies via search-results.