Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:57
Type | Values Removed | Values Added |
---|---|---|
References | () http://marc.info/?l=bugtraq&m=111645317713662&w=2 - | |
References | () http://secunia.com/advisories/15433 - | |
References | () http://securitytracker.com/id?1014005 - | |
References | () http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097644.htm - | |
References | () http://www.rem0te.com/public/images/zen.pdf - Vendor Advisory | |
References | () http://www.securityfocus.com/bid/13678 - | |
References | () http://www.vupen.com/english/advisories/2005/0571 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/20639 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/20644 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/20645 - |
Information
Published : 2005-05-25 04:00
Updated : 2024-11-20 23:57
NVD link : CVE-2005-1543
Mitre link : CVE-2005-1543
CVE.ORG link : CVE-2005-1543
JSON object : View
Products Affected
novell
- zenworks
- zenworks_servers
- zenworks_desktops
- zenworks_remote_management
- zenworks_server_management
CWE