Описание
Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 2.0.3 HP1 for Windows allow remote attackers to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.
Ссылки
- Vendor Advisory
- Patch
- Vendor Advisory
- Vendor Advisory
- Patch
- Vendor Advisory
Уязвимые конфигурации
Конфигурация 1
Одно из
cpe:2.3:a:novell:groupwise_messenger:2.0:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise_messenger:2.0.2:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise_messenger:2.0.3:*:*:*:*:*:*:*
EPSS
Процентиль: 99%
0.73339
Высокий
10 Critical
CVSS2
Дефекты
CWE-119
Связанные уязвимости
github
почти 4 года назад
Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 2.0.3 HP1 for Windows allow remote attackers to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.
EPSS
Процентиль: 99%
0.73339
Высокий
10 Critical
CVSS2
Дефекты
CWE-119