Gravité: : Critique
  Identifiant(s) CVE: : CVE-2008-2703
  Date du conseil: 21 juillet 2015

  Description

Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 2.0.3 HP1 for Windows allow remote attackers to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.

  Information Exposure Rating:

Apply associated Trend Micro DPI Rules.

  Solutions

  Trend Micro Deep Security DPI Rule Number: 1002615
  Trend Micro Deep Security DPI Rule Name: 1002615 - Novell GroupWise Messenger Client Buffer Overflow Vulnerabilities

  Affected software and version:

  • Novell GroupWise Messenger 2.0
  • Novell GroupWise Messenger 2.0.2
  • Novell GroupWise Messenger 2.0.3
  • novell groupwise_messenger 2.0
  • novell groupwise_messenger 2.0.2
  • novell groupwise_messenger 2.0.3