Gravedad: Crítico
  Fecha recomendada: 21 de julio de 2015

  Descripción

Novell ZENworks Configuration Management is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data. An attacker can leverage this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will compromise the affected application. Failed exploit attempts will result in a denial-of-service condition.

  Revelación de la información

Apply associated Trend Micro DPI Rules.

  Soluciones

  Trend Micro Deep Security DPI Rule Number: 1005099
  Trend Micro Deep Security DPI Rule Name: 1005099 - Novell ZENworks Configuration Management Preboot Service 0x21 Buffer Overflow

  Software y versión afectados

  • Novell ZENworks Configuration Management