| Summary | Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests. |
|---|---|
| Publication Date | May 25, 2005, 1 p.m. |
| Registration Date | Jan. 29, 2021, 5:58 p.m. |
| Last Update | July 11, 2017, 10:32 a.m. |
| CVSS2.0 : HIGH | |
| Score | 7.5 |
|---|---|
| Vector | AV:N/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) | ネットワーク |
| 攻撃条件の複雑さ(AC) | 低 |
| 攻撃前の認証要否(Au) | 不要 |
| 機密性への影響(C) | 低 |
| 完全性への影響(I) | 低 |
| 可用性への影響(A) | 低 |
| Get all privileges. | いいえ |
| Get user privileges | はい |
| Get other privileges | いいえ |
| User operation required | いいえ |
| Configuration1 | or higher | or less | more than | less than | |
| cpe:2.3:a:novell:zenworks:6.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:novell:zenworks_desktops:3.2:sp2:*:*:*:*:*:* | |||||
| cpe:2.3:a:novell:zenworks_desktops:4.0:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:novell:zenworks_desktops:4.0.1:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:novell:zenworks_remote_management:*:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:novell:zenworks_server_management:6.5:*:*:*:*:*:*:* | |||||
| cpe:2.3:a:novell:zenworks_servers:3.2:*:*:*:*:*:*:* | |||||