vendor:
GroupWise Client
by:
SecurityFocus
7.5
CVSS
HIGH
Buffer Overflow
119
CWE
Product Name: GroupWise Client
Affected Version From: 7.0.3.1294
Affected Version To: 7.0.3.1294
Patch Exists: YES
Related CWE: N/A
CPE: N/A
Metasploit:
N/A
Other Scripts:
N/A
Tags: N/A
CVSS Metrics: N/A
Nuclei References:
N/A
Nuclei Metadata: N/A
Platforms Tested: Internet Explorer
2008
Novell GroupWise Client Buffer Overflow Vulnerability
Novell GroupWise Client is prone to an unspecified buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Successful exploits allow remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions.
Mitigation:
Users should exercise caution when processing untrusted input and should never visit untrusted websites or follow links provided by unknown or untrusted sources.