Vulnerabilities > CVE-2005-1543 - Unspecified vulnerability in Novell products
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN Summary
Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 7 |
Exploit-Db
description ZENworks 6.5 Desktop/Server Management Remote Stack Overflow. CVE-2005-1543. Remote exploit for windows platform id EDB-ID:1150 last seen 2016-01-31 modified 2005-08-12 published 2005-08-12 reporter N/A source https://www.exploit-db.com/download/1150/ title ZENworks 6.5 Desktop/Server Management Remote Stack Overflow description Novell ZENworks 6.5 Desktop/Server Management Overflow. CVE-2005-1543. Remote exploit for windows platform id EDB-ID:16815 last seen 2016-02-02 modified 2010-07-25 published 2010-07-25 reporter metasploit source https://www.exploit-db.com/download/16815/ title Novell ZENworks 6.5 Desktop/Server Management Overflow
Metasploit
description | This module exploits a heap overflow in the Novell ZENworks Desktop Management agent. This vulnerability was discovered by Alex Wheeler. |
id | MSF:EXPLOIT/WINDOWS/NOVELL/ZENWORKS_DESKTOP_AGENT |
last seen | 2020-06-01 |
modified | 2017-07-24 |
published | 2006-01-16 |
references | https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1543 |
reporter | Rapid7 |
source | https://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/novell/zenworks_desktop_agent.rb |
title | Novell ZENworks 6.5 Desktop/Server Management Overflow |
Nessus
NASL family | Gain a shell remotely |
NASL id | ZENWORKS_MULTIPLE.NASL |
description | The remote host is running Novell ZENworks Desktop or Server Management, a remote desktop management software. The remote version of this software is affected by multiple heap and stack overflow vulnerabilities which may be exploited by an attacker to to execute arbitrary code on the remote host with SYSTEM privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 18524 |
published | 2005-06-17 |
reporter | This script is Copyright (C) 2005-2018 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/18524 |
title | Novell ZENworks Multiple Remote Pre-Authentication Overflows |
code |
|
Packetstorm
data source | https://packetstormsecurity.com/files/download/83038/zenworks_desktop_agent.rb.txt |
id | PACKETSTORM:83038 |
last seen | 2016-12-05 |
published | 2009-11-26 |
reporter | anonymous |
source | https://packetstormsecurity.com/files/83038/Novell-ZENworks-6.5-Desktop-Server-Management-Overflow.html |
title | Novell ZENworks 6.5 Desktop/Server Management Overflow |
Saint
bid | 13678 |
description | Novell ZENworks Remote Management authentication buffer overflow |
id | misc_zenworks |
osvdb | 16698 |
title | zenworks_remote_management_auth |
type | remote |
References
- http://marc.info/?l=bugtraq&m=111645317713662&w=2
- http://marc.info/?l=bugtraq&m=111645317713662&w=2
- http://secunia.com/advisories/15433
- http://secunia.com/advisories/15433
- http://securitytracker.com/id?1014005
- http://securitytracker.com/id?1014005
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097644.htm
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097644.htm
- http://www.rem0te.com/public/images/zen.pdf
- http://www.rem0te.com/public/images/zen.pdf
- http://www.securityfocus.com/bid/13678
- http://www.securityfocus.com/bid/13678
- http://www.vupen.com/english/advisories/2005/0571
- http://www.vupen.com/english/advisories/2005/0571
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20639
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20639
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20644
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20644
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20645
- https://exchange.xforce.ibmcloud.com/vulnerabilities/20645