First published: Sun May 05 2013(Updated: )
Multiple unquoted Windows search path vulnerabilities in Novell ZENworks Desktop Management (ZDM) 7 through 7.1 might allow local users to gain privileges via a Trojan horse "program" file in the C: folder, related to an attempted launch of (1) ZenRem32.exe or (2) wm.exe.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell ZENworks Desktop Management | =7 | |
Novell ZENworks Desktop Management | =7.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2013-1092 is considered a high severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2013-1092, ensure that all unquoted service paths in the Novell ZENworks Desktop Management installation are properly quoted.
CVE-2013-1092 affects Novell ZENworks Desktop Management versions 7 and 7.1.
CVE-2013-1092 facilitates local privilege escalation attacks through the execution of malicious programs.
A potential workaround for CVE-2013-1092 is to restrict access to the C: folder to prevent unauthorized users from placing Trojan horse files.