Vulnerability Name:

CVE-2005-1543 (CCN-20639)

Assigned:2005-05-18
Published:2005-05-18
Updated:2017-07-11
Summary:Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Authentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): 
Access Complexity (AC): 
Athentication (Au): 
Impact Metrics:Confidentiality (C): 
Integrity (I): 
Availibility (A): 
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: BugTraq Mailing List, Wed May 18 2005 - 16:07:53 CDT
NOVELL ZENWORKS MULTIPLE REMØTE STACK & HEAP OVERFLOWS

Source: MITRE
Type: CNA
CVE-2005-1543

Source: BUGTRAQ
Type: UNKNOWN
20050518 NOVELL ZENWORKS MULTIPLE =?utf-8?Q?REM=C3=98TE?= STACK & HEAP OVERFLOWS

Source: CCN
Type: SA15433
Novell ZENworks Remote Management Buffer Overflows

Source: SECUNIA
Type: UNKNOWN
15433

Source: CCN
Type: SECTRACK ID: 1014005
Novell ZENworks Remote Management Buffer Overflows in Authentication Protocol Let Remote Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1014005

Source: CCN
Type: Novell Technical Information Document TID10097644
ZENworks Remote Management fails to properly validate authentication

Source: CONFIRM
Type: UNKNOWN
http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097644.htm

Source: CCN
Type: Novell ZENworks Web page
ZENworks® Suite

Source: CCN
Type: Novell Security Advisory, May 18, 2005
Novell ZENworks Multiple Remote Stack & Heap Overflows

Source: MISC
Type: Vendor Advisory
http://www.rem0te.com/public/images/zen.pdf

Source: BID
Type: UNKNOWN
13678

Source: CCN
Type: BID-13678
Novell ZENworks Multiple Remote Pre-Authentication Buffer Overflow Vulnerabilities

Source: VUPEN
Type: UNKNOWN
ADV-2005-0571

Source: XF
Type: UNKNOWN
novell-zenworks-remote-management-bo(20639)

Source: XF
Type: UNKNOWN
novell-zenwork-remote-management-bo(20639)

Source: XF
Type: UNKNOWN
novell-zenwork-remote-management-1-bo(20644)

Source: XF
Type: UNKNOWN
novell-zenwork-remote-management-2-bo(20645)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:zenworks:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_desktops:3.2:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_desktops:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_desktops:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_remote_management:*:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_server_management:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_servers:3.2:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:zenworks_desktops:3.2:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_desktops:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_desktops:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_desktop_management:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_server_management:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_servers:3.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-1543 (CCN-20644)

    Assigned:2005-05-18
    Published:2005-05-18
    Updated:2005-05-18
    Summary:Novell ZENworks is vulnerable to a stack-based buffer overflow in the ZEN Remote Management authentication protocol (zenrem32.exe) for type 1 authentication requests. A remote unauthenticated attacker could overflow a buffer and possibly gain control over the system with user privileges. It may be possible for an attacker to use these vulnerabilities to perform further related attacks against the system in the default configuration.
    CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): Low
    User Interaction (UI): Required
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    6.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
    5.4 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:F/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Consequences:Gain Access
    References:Source: CCN
    Type: BugTraq Mailing List, Wed May 18 2005 - 16:07:53 CDT
    NOVELL ZENWORKS MULTIPLE REMØTE STACK & HEAP OVERFLOWS

    Source: MITRE
    Type: CNA
    CVE-2005-1543

    Source: CCN
    Type: SA15433
    Novell ZENworks Remote Management Buffer Overflows

    Source: CCN
    Type: SECTRACK ID: 1014005
    Novell ZENworks Remote Management Buffer Overflows in Authentication Protocol Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: Novell Technical Information Document TID10097644
    ZENworks Remote Management fails to properly validate authentication

    Source: CCN
    Type: Novell ZENworks Web page
    ZENworks® Suite

    Source: CCN
    Type: BID-13678
    Novell ZENworks Multiple Remote Pre-Authentication Buffer Overflow Vulnerabilities

    Source: XF
    Type: UNKNOWN
    novell-zenworks-remote-management-1-bo(20644)

    Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:novell:zenworks_desktops:3.2:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_desktops:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_desktops:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_desktop_management:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_server_management:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:zenworks_servers:3.2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Vulnerability Name:

    CVE-2005-1543 (CCN-20645)

    Assigned:2005-05-18
    Published:2005-05-18
    Updated:2017-07-11
    Summary:Multiple stack-based and heap-based buffer overflows in Remote Management authentication (zenrem32.exe) on Novell ZENworks 6.5 Desktop and Server Management, ZENworks for Desktops 4.x, ZENworks for Servers 3.x, and Remote Management allows remote attackers to execute arbitrary code via (1) unspecified vectors, (2) type 1 authentication requests, and (3) type 2 authentication requests.
    CVSS v3 Severity:5.5 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:L/I:L/A:L)
    Exploitability Metrics:Attack Vector (AV): Network
    Attack Complexity (AC): Low
    Privileges Required (PR): Low
    User Interaction (UI): Required
    Scope:Scope (S): Unchanged
    Impact Metrics:Confidentiality (C): Low
    Integrity (I): Low
    Availibility (A): Low
    CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
    6.2 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:F/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Authentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    6.5 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P)
    5.4 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P/E:F/RL:OF/RC:C)
    Exploitability Metrics:Access Vector (AV): 
    Access Complexity (AC): 
    Athentication (Au): 
    Impact Metrics:Confidentiality (C): 
    Integrity (I): 
    Availibility (A): 
    Vulnerability Type:CWE-Other
    Vulnerability Consequences:Gain Access
    References:Source: CCN
    Type: BugTraq Mailing List, Wed May 18 2005 - 16:07:53 CDT
    NOVELL ZENWORKS MULTIPLE REMØTE STACK & HEAP OVERFLOWS

    Source: MITRE
    Type: CNA
    CVE-2005-1543

    Source: CCN
    Type: SA15433
    Novell ZENworks Remote Management Buffer Overflows

    Source: CCN
    Type: SECTRACK ID: 1014005
    Novell ZENworks Remote Management Buffer Overflows in Authentication Protocol Let Remote Users Execute Arbitrary Code

    Source: CCN
    Type: Novell Technical Information Document TID10097644
    ZENworks Remote Management fails to properly validate authentication

    Source: CCN
    Type: Novell ZENworks Web page
    ZENworks® Suite

    Source: CCN
    Type: BID-13678
    Novell ZENworks Multiple Remote Pre-Authentication Buffer Overflow Vulnerabilities

    Source: XF
    Type: UNKNOWN
    novell-zenworks-remote-management-2-bo(20645)

    BACK
    novell zenworks 6.5
    novell zenworks desktops 3.2 sp2
    novell zenworks desktops 4.0
    novell zenworks desktops 4.0.1
    novell zenworks remote management *
    novell zenworks server management 6.5
    novell zenworks servers 3.2
    novell zenworks desktops 3.2 sp2
    novell zenworks desktops 4.0
    novell zenworks desktops 4.0.1
    novell zenworks desktop management 6.5
    novell zenworks server management 6.5
    novell zenworks servers 3.2
    novell zenworks desktops 3.2 sp2
    novell zenworks desktops 4.0
    novell zenworks desktops 4.0.1
    novell zenworks desktop management 6.5
    novell zenworks server management 6.5
    novell zenworks servers 3.2