{"$ref":"https://www.cert.ssi.gouv.fr/openapi.json","affected_systems":[{"description":"Novell ZENworks for Servers 3.x","product":{"name":"N/A","vendor":{"name":"Novell","scada":false}}},{"description":"Novell ZENworks for Desktops 4.x","product":{"name":"N/A","vendor":{"name":"Novell","scada":false}}},{"description":"Novell ZENworks 6.5 Desktop Management","product":{"name":"N/A","vendor":{"name":"Novell","scada":false}}},{"description":"Novell ZENworks 6.5 Server Management","product":{"name":"N/A","vendor":{"name":"Novell","scada":false}}}],"affected_systems_content":null,"content":"## Description\n\nDe multiples vuln\u00e9rabilit\u00e9s de type d\u00e9bordement de tampon ont \u00e9t\u00e9\nd\u00e9couvertes dans le syst\u00e8me d'authentification des produits ZENworks de\nNovell. Celles-ci permettent \u00e0 un utilisateur mal intentionn\u00e9 d'ex\u00e9cuter\ndu code arbitraire \u00e0 distance par le biais de paquets judicieusement\nconstruits.\n\n## Solution\n\nSe r\u00e9f\u00e9rer au document d'information technique de l'\u00e9diteur (cf.\nDocumentation).\n","cves":[],"links":[],"reference":"CERTA-2005-AVI-171","revisions":[{"description":"version initiale.","revision_date":"2005-05-23T00:00:00.000000"}],"risks":[{"description":"Ex\u00e9cution de code arbitraire \u00e0 distance"}],"summary":null,"title":"Multiples vuln\u00e9rabilit\u00e9s de Novell ZENworks Remote Management","vendor_advisories":[{"published_at":null,"title":"Document d'information technique de Novell du 9 mai 2005","url":"http://support.novell.com/cgi-bin/search/searchtid.cgi?/10097644.htm"}]}
