7.5
CVSSv2

CVE-2005-1543

Published: 25/05/2005 Updated: 11/07/2017
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 760
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote malicious users to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests.

Vulnerable Product Search on Vulmon Subscribe to Product

novell zenworks remote management

novell zenworks server management 6.5

novell zenworks 6.5

novell zenworks desktops 3.2

novell zenworks desktops 4.0

novell zenworks desktops 4.0.1

novell zenworks servers 3.2

Exploits

# # package Msf::Exploit::zenworks_desktop_agent; use strict; use base "Msf::Exploit"; use Pex::Text; my $advanced = { }; my $info = { 'Name' => 'ZENworks 65 Desktop/Server Management Remote Stack Overflow', 'Version' => '$Revision: 11 $', 'Authors' => [ 'Anonymous', ], 'Arch' => [ 'x86' ], 'OS' => [ 'win32' ...
## # $Id: zenworks_desktop_agentrb 9929 2010-07-25 21:37:54Z jduck $ ## ## # This file is part of the Metasploit Framework and may be subject to # redistribution and commercial restrictions Please see the Metasploit # Framework web site for more information on licensing and terms of use # metasploitcom/framework/ ## require 'msf/core' ...