ID CVE-2006-0992
Summary Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier. Upgrade to GroupWise Messenger, 2.0 Public Beta 2 to fix this issue.
References
Vulnerable Configurations
  • cpe:2.3:a:novell:groupwise_messenger:2.0:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise_messenger:2.0:*:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 18-10-2018 - 16:30)
Impact:
Exploitability:
CWE NVD-CWE-Other
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
bid 17503
bugtraq 20060413 ZDI-06-008: Novell GroupWise Messenger Accept-Language Buffer Overflow
confirm http://support.novell.com/cgi-bin/search/searchtid.cgi?10100861.htm
exploit-db 1679
misc
osvdb 24617
sectrack 1015911
secunia 19663
vupen ADV-2006-1355
xf groupwise-accept-language-bo(25828)
saint via4
bid 17503
description Novell GroupWise Messenger Accept-Language buffer overflow
id mail_web_groupwisemessenger
osvdb 24617
title groupwise_messenger_accept_language
type remote
Last major update 18-10-2018 - 16:30
Published 14-04-2006 - 10:02
Last modified 18-10-2018 - 16:30
Back to Top