Schweregrad: : Crítico
  Data do informe: 21 julho 2015

  Descrição

Novell ZENworks Configuration Management is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data. An attacker can leverage this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will compromise the affected application. Failed exploit attempts will result in a denial-of-service condition.

  Exposição das informações

Apply associated Trend Micro DPI Rules.

  Solução

  Trend Micro Deep Security DPI Rule Number: 1005099
  Trend Micro Deep Security DPI Rule Name: 1005099 - Novell ZENworks Configuration Management Preboot Service 0x21 Buffer Overflow

  Software infectado e versão:

  • Novell ZENworks Configuration Management