Novell ZENworks Configuration Management Preboot Service 0x6c Buffer Overflow
https://packetstormsecurity.com/files/114899/zenworks_preboot_op6c_bof.rb.txt
https://packetstormsecurity.com/files/114899/zenworks_preboot_op6c_bof.rb.txthttps://packetstormsecurity.com/files/114899/Novell-ZENworks-Configuration-Management-Preboot-Service-0x6c-Buffer-Overflow.htmlThu, 19 Jul 2012 20:44:50 GMTThis Metasploit module exploits a remote buffer overflow in the ZENworks Configuration Management. The vulnerability exists in the Preboot service and can be triggered by sending a specially crafted packet with the opcode 0x6c (PROXY_CMD_GET_NEXT_STEP) to port 998/TCP. The module has been successfully tested on Novell ZENworks Configuration Management 10 SP2 / SP3 and Windows Server 2003 SP2 (DEP bypass).