Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2011-3176Improper Restriction of Operations within the Bounds of a Memory Buffer in Zenworks Configuration Management

Severity
10.0CRITICALNVD
EPSS
83.6%
top 0.71%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 9
Latest updateMay 17

Description

Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 11.1 and 11.1a allows remote attackers to execute arbitrary code via an opcode 0x4c request.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages1 packages

🔴Vulnerability Details

2
GHSA
GHSA-vqcj-59x7-m938: Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 112022-05-17
CVEList
CVE-2011-3176: Stack-based buffer overflow in the Preboot Service in Novell ZENworks Configuration Management (ZCM) 112012-04-09

💥Exploits & PoCs

2
Exploit-DB
Novell ZENworks Configuration Management Preboot Service - 0x4c Buffer Overflow (Metasploit)2012-07-20
Exploit-DB
Novell ZENworks Configuration Management Preboot Service - 0x6c Buffer Overflow (Metasploit)2012-07-20
CVE-2011-3176 — CRITICAL severity | cvebase