First published: Mon Apr 09 2012(Updated: )
Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x6c request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell ZENworks Configuration Management | =11.1a | |
Novell ZENworks Configuration Management | =11.1 | |
Micro Focus ZENworks Configuration Management | =11.1 | |
Micro Focus ZENworks Configuration Management | =11.1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3175 is considered a critical vulnerability due to the potential for remote code execution.
To mitigate CVE-2011-3175, you should upgrade to a patched version of Novell ZENworks Configuration Management.
CVE-2011-3175 affects Novell ZENworks Configuration Management versions 11.1 and 11.1a.
Yes, CVE-2011-3175 can be exploited remotely by sending a specially crafted opcode 0x6c request.
CVE-2011-3175 is classified as a stack-based buffer overflow vulnerability.