Schweregrad:: Kritisch
  Hinweisdatum: 21 Juli 2015

  Beschreibung

Novell ZENworks Configuration Management is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data. An attacker can leverage this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will compromise the affected application. Failed exploit attempts will result in a denial-of-service condition.

  Trend Micro Lösungen

Apply associated Trend Micro DPI Rules.

  Lösungen

  Trend Micro Deep Security DPI Rule Number: 1005099
  Trend Micro Deep Security DPI Rule Name: 1005099 - Novell ZENworks Configuration Management Preboot Service 0x21 Buffer Overflow

  Betroffene Software und Version:

  • Novell ZENworks Configuration Management