CVE-2010-4323
Novell ZenWorks TFTPD Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
2Exploited in Wild
-Decision
Descriptions
Heap-based buffer overflow in novell-tftp.exe in Novell ZENworks Configuration Manager (ZCM) 10.3.1, 10.3.2, and 11.0, and earlier versions, allows remote attackers to execute arbitrary code via a long TFTP request.
Desbordamiento de búfer basado en memoria dinámica en novell-tftp.exe en Novell ZENworks Configuration Manager (ZCM) v10.3.1, v10.3.2, y v11.0 y versiones anteriores, permite a atacantes remotos ejecutar código arbitrario a través de una consulta TFTP demasiado larga.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell Zenworks Configuration Manager. Authentication is not required to exploit this vulnerability.
The flaw exists within the novell-tftp.exe component which listens by default on UDP port 69. When handling a request the process blindly copies user supplied data into a fixed-length buffer on the heap. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the ZenWorks user.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2010-11-29 CVE Reserved
- 2011-02-17 CVE Published
- 2011-02-18 First Exploit
- 2024-01-17 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (11)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/8092 | Third Party Advisory | |
http://securityreason.com/securityalert/8094 | Third Party Advisory | |
http://www.securityfocus.com/archive/1/516524/100/0/threaded | Mailing List | |
http://www.securitytracker.com/id?1025092 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-11-089 | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/65438 | Vdb Entry |
URL | Date | SRC |
---|---|---|
https://www.exploit-db.com/exploits/16191 | 2011-02-18 | |
http://www.securityfocus.com/bid/46434 | 2024-08-07 |
URL | Date | SRC |
---|---|---|
http://www.vupen.com/english/advisories/2011/0425 | 2018-10-10 |
URL | Date | SRC |
---|---|---|
http://secunia.com/advisories/43379 | 2018-10-10 | |
http://www.novell.com/support/viewContent.do?externalId=7007896 | 2018-10-10 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Novell Search vendor "Novell" | Zenworks Configuration Manager Search vendor "Novell" for product "Zenworks Configuration Manager" | <= 11.0 Search vendor "Novell" for product "Zenworks Configuration Manager" and version " <= 11.0" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Zenworks Configuration Manager Search vendor "Novell" for product "Zenworks Configuration Manager" | 10.3.1 Search vendor "Novell" for product "Zenworks Configuration Manager" and version "10.3.1" | - |
Affected
| ||||||
Novell Search vendor "Novell" | Zenworks Configuration Manager Search vendor "Novell" for product "Zenworks Configuration Manager" | 10.3.2 Search vendor "Novell" for product "Zenworks Configuration Manager" and version "10.3.2" | - |
Affected
|