CVE-2005-1543

critical

Description

Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests.

References

https://exchange.xforce.ibmcloud.com/vulnerabilities/20645

https://exchange.xforce.ibmcloud.com/vulnerabilities/20644

https://exchange.xforce.ibmcloud.com/vulnerabilities/20639

http://www.vupen.com/english/advisories/2005/0571

http://www.securityfocus.com/bid/13678

http://www.rem0te.com/public/images/zen.pdf

http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097644.htm

http://securitytracker.com/id?1014005

http://secunia.com/advisories/15433

http://marc.info/?l=bugtraq&m=111645317713662&w=2

Details

Source: Mitre, NVD

Published: 2005-05-25

Updated: 2017-07-11

Risk Information

CVSS v2

Base Score: 7.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P

Severity: High

CVSS v3

Base Score: 9.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Severity: Critical