Short Name |
APP:NOVELL:MESSENGER-BOF |
---|---|
Severity |
High |
Recommended |
Yes |
Recommended Action |
Drop |
Category |
APP |
Keywords |
Novell Messenger Client Filename Parameter Stack Buffer Overflow |
Release Date |
2013/05/06 |
Update Number |
2260 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known vulnerability in the Novell Messenger. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the server.
Stack-based buffer overflow in the nim: protocol handler in Novell GroupWise Messenger 2.04 and earlier, and Novell Messenger 2.1.x and 2.2.x before 2.2.2, allows remote attackers to execute arbitrary code via an import command containing a long string in the filename parameter.