100 columns or each line in the description
parent
d69a46a9f0
commit
8f867b5b0d
|
@ -17,11 +17,12 @@ class Metasploit3 < Msf::Exploit::Remote
|
||||||
super(update_info(info,
|
super(update_info(info,
|
||||||
'Name' => 'Novell ZENworks Configuration Management Preboot Service 0x4c Buffer Overflow',
|
'Name' => 'Novell ZENworks Configuration Management Preboot Service 0x4c Buffer Overflow',
|
||||||
'Description' => %q{
|
'Description' => %q{
|
||||||
This module exploits a remote buffer overflow in the ZENworks Configuration Management 10 SP2.
|
This module exploits a remote buffer overflow in the ZENworks Configuration
|
||||||
The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted
|
Management 10 SP2. The vulnerability exists in the Preboot service and can be
|
||||||
packet with the opcode 0x4c (PROXY_CMD_PREBOOT_TASK_INFO2) to port 998/TCP. The module has been
|
triggered by sending a specially crafted packet with the opcode 0x4c
|
||||||
successfully tested on tested on Novell ZENworks Configuration Management 10 SP2 and Windows Server
|
(PROXY_CMD_PREBOOT_TASK_INFO2) to port 998/TCP. The module has been successfully
|
||||||
2003 SP2 (DEP bypass).
|
tested on tested on Novell ZENworks Configuration Management 10 SP2 and Windows
|
||||||
|
Server 2003 SP2 (DEP bypass).
|
||||||
},
|
},
|
||||||
'License' => MSF_LICENSE,
|
'License' => MSF_LICENSE,
|
||||||
'Author' =>
|
'Author' =>
|
||||||
|
|
Loading…
Reference in New Issue