Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:NOVELL:GROUPWISE-MAILTO-BO

Severity

High

Recommended

No

Category

APP

Keywords

Novell GroupWise mailto URI Handler Buffer Overflow Vulnerability

Release Date

2012/11/15

Update Number

2203

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

HTTP:Novell GroupWise mailto URI Handler Buffer Overflow Vulnerability


This signature detects attempts to exploit a known vulnerability in the Novell GroupWise URI Handler. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.

Extended Description

Novell GroupWise is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data. Successfully exploiting this issue will allow an attacker to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. This issue affects GroupWise 7.0; other versions may also be affected. UPDATE (April 30, 2008): A report indicates that this issue cannot be reproduced. We will update this BID as more information emerges.

Affected Products

  • Novell Groupwise 7.0.0

References

  • BugTraq: 28969
  • CVE: CVE-2008-2069

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out