First published: Mon Apr 09 2012(Updated: )
Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x4c request.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell ZENworks Configuration Management | =11.1a | |
Novell ZENworks Configuration Management | =11.1 | |
Micro Focus ZENworks Configuration Management | =11.1 | |
Micro Focus ZENworks Configuration Management | =11.1a |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3176 is considered to have a high severity due to the potential for remote code execution.
To fix CVE-2011-3176, you should apply the latest patches for Novell ZENworks Configuration Management 11.1 or 11.1a.
CVE-2011-3176 affects Novell ZENworks Configuration Management versions 11.1 and 11.1a.
CVE-2011-3176 can be exploited by attackers to execute arbitrary code due to a stack-based buffer overflow.
Organizations using the affected versions of Novell ZENworks Configuration Management are at risk of CVE-2011-3176.