METASPLOIT-modules/exploits/windows/novell/zenworks_preboot_op6c_bof.rb

METASPLOIT ruby WORKING POC
Exploit for CVE-2011-3175 - Novell Zenworks Configuration Management - Memory Corruption
AI Analysis

This Metasploit module exploits a buffer overflow in Novell ZENworks Configuration Management Preboot Service via opcode 0x6c. It uses ROP chains to bypass DEP and achieve remote code execution on Windows Server 2003 SP2.

Attack Type
RCE
Complexity
moderate
Reliability
reliable
MITRE ATT&CK
T1190 - Exploit Public-Facing Application T1203 - Exploitation for Client Execution
Loading exploit code...
Download ZIP Password: eip
Vulnerability
CVE-2011-3175
Novell Zenworks Configuration Management - Memory Corruption