Directory traversal vulnerability in the set_log_config function in regclnt.dll in unifid.exe in NetIQ Privileged User ManagerID: oval:org.secpod.oval:def:9080 | Date: (C)2013-02-05 (M)2022-10-10 |
Class: VULNERABILITY | Family: windows |
The host is installed with NetIQ Privileged User Manager 2.3.x before 2.3.1 HF2 and is prone to directory traversal vulnerability. A flaw is present in the application, which fails to handle directory traversal sequences in a log pathname. Successful exploitation allows remote authenticated users to create or overwrite arbitrary files.
Platform: |
Microsoft Windows XP |
Microsoft Windows Vista |
Microsoft Windows 7 |
Microsoft Windows Server 2003 |
Microsoft Windows Server 2008 |
Microsoft Windows Server 2008 R2 |
Microsoft Windows Server 2012 |
Microsoft Windows 8 |
Product: |
NetIQ Privileged User Manager |