Novell ZENworks Handheld Management ZfHIPCND.exe Remote Code Execution VulnerabilityZDI-10-230: November 7th, 2010
TippingPoint™ IPS Customer ProtectionTippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID 10642. For further product information on the TippingPoint IPS:
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Novell ZENworks Handheld Management. Authentication is not required to exploit this vulnerability.
The specific flaw exists within module ZfHIPCND.exe. This process is responsible for handling the data received on TCP port 2400. The module reads in the data stream and copies the specified amount of bytes into a fixed-length buffer located in the heap. An attacker can overflow this buffer and execute arbitrary code with SYSTEM privileges.
Vendor ResponseNovell states:
Patch link, located in the TID:
2010-08-25 - Vulnerability reported to vendor
2010-11-07 - Coordinated public release of advisory
CreditThis vulnerability was discovered by: