Vulnerability Description
Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x4c request.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Novell | Zenworks Configuration Management | 11.1 |
Related Weaknesses (CWE)
References
- http://download.novell.com/Download?buildid=rs4B5jhWKf8~
- http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5127930.
- http://www.exploit-db.com/exploits/19959
- http://www.novell.com/support/viewContent.do?externalId=7010044
- http://www.verisigninc.com/en_US/products-and-services/network-intelligence-avai
- http://download.novell.com/Download?buildid=rs4B5jhWKf8~
- http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5127930.
- http://www.exploit-db.com/exploits/19959
- http://www.novell.com/support/viewContent.do?externalId=7010044
- http://www.verisigninc.com/en_US/products-and-services/network-intelligence-avai
FAQ
What is CVE-2011-3176?
CVE-2011-3176 is a vulnerability with a CVSS score of 10.0 (HIGH). Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x4c request.
How severe is CVE-2011-3176?
CVE-2011-3176 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-3176?
Check the references section above for vendor advisories and patch information. Affected products include: Novell Zenworks Configuration Management.