Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

APP:NOVELL:GWCLIENT-BOF

Severity

High

Recommended

No

Recommended Action

Drop

Category

APP

Keywords

Novell GroupWise Messenger HTTP Response Handling Stack Overflow

Release Date

2013/09/10

Update Number

2298

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

APP: Novell GroupWise Messenger HTTP Response Handling Stack Overflow


This signature detects attempts to exploit a known vulnerability in Novell GroupWise Messenger. It is due to improper handling of crafted HTTP responses. An unauthenticated remote attacker can exploit this vulnerability by sending spoofed HTTP responses to the target host. Successful attack could allow for arbitrary code execution with privileges of the currently logged in user. In an attack case where code injection is not successful, the affected application will terminate.

Extended Description

Novell GroupWise Messenger is prone to two buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized buffer. Attackers can exploit these issues to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. Versions prior to Novell GroupWise Messenger 2.0.3 HP1 are vulnerable.

Affected Products

  • Novell GroupWise Messenger 2.0
  • Novell GroupWise Messenger 2.0.3

References

  • BugTraq: 29602
  • CVE: CVE-2008-2703

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out