Vulnerability Details : CVE-2011-0742
Buffer overflow in ZfHIPCND.exe in Novell ZENworks Handheld Management 7.0 allows remote attackers to execute arbitrary code via a crafted IP Conduit packet to TCP port 2400.
Vulnerability category: OverflowExecute code
Exploit prediction scoring system (EPSS) score for CVE-2011-0742
Probability of exploitation activity in the next 30 days: 80.70%
Percentile, the proportion of vulnerabilities that are scored at or less: ~ 98 % EPSS Score History EPSS FAQ
CVSS scores for CVE-2011-0742
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source |
---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
CWE ids for CVE-2011-0742
-
The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-0742
-
http://www.novell.com/support/viewContent.do?externalId=7007663
Security Vulnerability Heap Buffer Overflow with ZENworks 7 Handheld ManagementVendor Advisory
-
http://www.securitytracker.com/id?1024993
Novell ZENworks Handheld Management Heap Overflow Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.vupen.com/english/advisories/2011/0221
Webmail | OVH- OVHVendor Advisory
-
http://www.zerodayinitiative.com/advisories/ZDI-11-026/
ZDI-11-026 | Zero Day Initiative
-
http://www.securityfocus.com/bid/46024
Novell ZENworks Handheld Management Access Point 'ZfHIPCND.exe' Buffer Overflow Vulnerability
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/64930
Novell ZENworks Handheld Management (ZHM) ZfHIPCnd.exe buffer overflow CVE-2011-0742 Vulnerability Report
-
http://telussecuritylabs.com/threats/show/FSC20110125-06
TELUS Security Labs | Software Research & Analysis
-
http://www.securityfocus.com/archive/1/516045/100/0/threaded
SecurityFocus
Products affected by CVE-2011-0742
- cpe:2.3:a:novell:zenworks_handheld_management:7:*:*:*:*:*:*:*