SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker
bugs
@
securitytracker.com






Category:   Application (Generic)  >   Lenovo ThinkManagement Console Vendors:   LANDesk Software, Lenovo
Lenovo ThinkManagement Console SOAP Interface Lets Remote Users Upload and Delete Files and Execute Arbitrary Code
SecurityTracker Alert ID:  1026693
SecurityTracker URL:  http://securitytracker.com/id/1026693
CVE Reference:   CVE-2012-1195, CVE-2012-1196   (Links to External Site)
Updated:  May 27 2014
Original Entry Date:  Feb 16 2012
Impact:   Execution of arbitrary code via network, Modification of user information, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  Exploit Included:  Yes  
Version(s): 9.0.3
Description:   Two vulnerabilities were reported in Lenovo ThinkManagement Console. A remote user can execute arbitrary code on the target system. A remote user can delete files on the target system.

A remote user can send a specially crafted SOAP request to the ServerSetup web service (/landesk/managementsuite/core/core.anonymous/ServerSetup.asmx) to upload an arbitrary file and then cause the file to be executed [CVE-2012-1195]. The 'RunAMTCommand' operation '-PutUpdateFileCore' command is affected.

A remote user can send a specially crafted SOAP request containing directory traversal characters to the VulCore web service (/WSVulnerabilityCore/VulCore.asmx) to delete an arbitrary file on the target system [CVE-2012-1196]. The 'SetTaskLogByFile' operation 'filename' parameter is affected.

The original advisory is available at:

http://secunia.com/advisories/47666/

Andrea Micalizzi (rgod) reported this vulnerability via Secunia.

Impact:   A remote user can execute arbitrary code on the target system.

A remote user can delete files on the target system.

Solution:   The vendor has issued a fix for CVE-2012-1195 (9.0 SP4).

No solution was available for CVE-2012-1196 at the time of this entry.

The vendor's advisory is available at:

http://cswebtools.landesk.com/downloads/ServicePack/LD90-SP4-Readme.htm

Vendor URL:  cswebtools.landesk.com/downloads/ServicePack/LD90-SP4-Readme.htm (Links to External Site)
Cause:   Access control error
Underlying OS:   Windows (Any)

Message History:   None.


 Source Message Contents

Date:  Thu, 16 Feb 2012 04:52:32 +0000
Subject:  Lenovo ThinkManagement Console


http://secunia.com/advisories/47666/


 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

Copyright 2014, SecurityGlobal.net LLC