Lumension® Endpoint Intelligence Center

Intelligence Center » Browse All Vulnerabilities » CVE-2008-2703

Overview

Vulnerability Score 10.0 10.0
CVE Id CVE-2008-2703
Last Modified 06 Sep 2011 12:00:00
Published 13 Jun 2008 03:41:00
Confidentiality Impact COMPLETE COMPLETE
Integrity Impact COMPLETE COMPLETE
Availability Impact COMPLETE COMPLETE
Access Vector NETWORK
Access Complexity LOW
Authentication NONE

CVE-2008-2703

Summary

Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 2.0.3 HP1 for Windows allow remote attackers to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.

Vulnerable Systems

Application

  • Novell Groupwise Messenger 2.0

  • Novell Groupwise Messenger 2.0.2

  • Novell Groupwise Messenger 2.0.3


References

CONFIRM - http://support.novell.com/docs/Readmes/InfoDocument/patchbuilder/readme_5026700.html

XF - groupwise-messenger-client-bo(42917)

VUPEN - ADV-2008-1764

SECTRACK - 1020209

BID - 29602

BUGTRAQ - 20080704 Novell GroupWise Messenger Client (GWIM) Remote Stack Overflow

SECUNIA - 30576


Last Updated: 27 May 2016 10:47:57