Gravité: : Critique
  Date du conseil: 21 juillet 2015

  Description

Novell ZENworks Configuration Management is prone to a stack-based buffer-overflow vulnerability because the application fails to perform adequate boundary-checks on user-supplied data. An attacker can leverage this issue to execute arbitrary code with SYSTEM-level privileges. Successful exploits will compromise the affected application. Failed exploit attempts will result in a denial-of-service condition.

  Information Exposure Rating:

Apply associated Trend Micro DPI Rules.

  Solutions

  Trend Micro Deep Security DPI Rule Number: 1005099
  Trend Micro Deep Security DPI Rule Name: 1005099 - Novell ZENworks Configuration Management Preboot Service 0x21 Buffer Overflow

  Affected software and version:

  • Novell ZENworks Configuration Management