Short Name |
APP:NOVELL:GROUPWISE-CLIENT-BO |
---|---|
Severity |
Major |
Recommended |
No |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Novell GroupWise Messenger Client Buffer Overflow |
Release Date |
2010/05/28 |
Update Number |
1693 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against Novell Groupwise Messenger Client. Attackers can execute arbitrary code within the context of the affected application.
Novell GroupWise Messenger is prone to two buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized buffer. Attackers can exploit these issues to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. Versions prior to Novell GroupWise Messenger 2.0.3 HP1 are vulnerable.