Novell ZENworks Handheld Management ZfHIPCND.exe Unspecified Buffer Overflow

critical Nessus Plugin ID 50679

Language:

Synopsis

The remote host is running a server that is affected by a remote heap overflow vulnerability.

Description

A vulnerability exists in the server ZfHIPCND.exe, which handles the data received on TCP port 2400. An attacker can overflow a buffer on a heap belonging to the server and possibly execute arbitrary code with SYSTEM privileges. Authentication is not required to exploit this vulnerability.

Solution

Apply patch ZHM_635573_29102010 or later.

See Also

https://www.zerodayinitiative.com/advisories/ZDI-10-230/

http://www.nessus.org/u?eca60455

Plugin Details

Severity: Critical

ID: 50679

File Name: novell_zenworks_handheld_management_zfhipcnd_buffer_overflow.nasl

Version: 1.11

Type: local

Agent: windows

Family: Windows

Published: 11/22/2010

Updated: 11/15/2018

Supported Sensors: Nessus Agent, Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.7

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

Required KB Items: SMB/Registry/Enumerated

Exploit Ease: No known exploits are available

Patch Publication Date: 11/2/2010

Vulnerability Publication Date: 11/2/2010

Reference Information

CVE: CVE-2010-4299

BID: 44700