First published: Wed May 25 2005(Updated: )
Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Zenworks Desktops | =4.0.1 | |
Novell Zenworks Server Management | =6.5 | |
Novell Zenworks Remote Management | ||
Novell ZENworks | =6.5 | |
Novell Zenworks Servers | =3.2 | |
Novell Zenworks Desktops | =4.0 | |
Novell Zenworks Desktops | =3.2-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-1543 is classified as a critical vulnerability due to the potential for remote code execution.
CVE-2005-1543 affects Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management.
To fix CVE-2005-1543, apply the latest patches and updates provided by Novell for the affected ZENworks products.
Yes, CVE-2005-1543 can be exploited by remote attackers to execute arbitrary code on affected systems.
The potential impacts of CVE-2005-1543 include unauthorized access to sensitive data and complete system compromise.