Required CVE Record Information
Description
Heap-based buffer overflow in novell-tftp.exe in Novell ZENworks Configuration Manager (ZCM) 10.3.1, 10.3.2, and 11.0, and earlier versions, allows remote attackers to execute arbitrary code via a long TFTP request.
References 10 Total
- securityfocus.com: 46434 vdb-entry
- exchange.xforce.ibmcloud.com: zenworks-tftpd-code-execution(65438) vdb-entry
- vupen.com: ADV-2011-0425 vdb-entry
- securityfocus.com: 20110217 ZDI-11-089: Novell ZenWorks TFTPD Remote Code Execution Vulnerability mailing-list
- http://www.novell.com/support/viewContent.do?externalId=7007896
- http://www.zerodayinitiative.com/advisories/ZDI-11-089
- securityreason.com: 8094 third-party-advisory
- securitytracker.com: 1025092 vdb-entry
- secunia.com: 43379 third-party-advisory
- securityreason.com: 8092 third-party-advisory
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 10 Total
- securityfocus.com: 46434 vdb-entryx_transferred
- exchange.xforce.ibmcloud.com: zenworks-tftpd-code-execution(65438) vdb-entryx_transferred
- vupen.com: ADV-2011-0425 vdb-entryx_transferred
- securityfocus.com: 20110217 ZDI-11-089: Novell ZenWorks TFTPD Remote Code Execution Vulnerability mailing-listx_transferred
- http://www.novell.com/support/viewContent.do?externalId=7007896 x_transferred
- http://www.zerodayinitiative.com/advisories/ZDI-11-089 x_transferred
- securityreason.com: 8094 third-party-advisoryx_transferred
- securitytracker.com: 1025092 vdb-entryx_transferred
- secunia.com: 43379 third-party-advisoryx_transferred
- securityreason.com: 8092 third-party-advisoryx_transferred