Lucene search

K
saintSAINT CorporationSAINT:7B4967F5E04185CF6EC53575760456A5
HistoryJan 15, 2008 - 12:00 a.m.

Novell GroupWise Client IMG SRC buffer overflow

2008-01-1500:00:00
SAINT Corporation
download.saintcorporation.com
16

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.37 Low

EPSS

Percentile

97.2%

Added: 01/15/2008
CVE: CVE-2007-6435
BID: 26875
OSVDB: 40870

Background

Novell GroupWise is an e-mail and collaboration product suite.

Problem

A buffer overflow vulnerability in the GroupWise client allows command execution when a user replies to or forwards a message containing an IMG tag with a specially crafted SRC attribute.

Resolution

Apply GroupWise 6.5.6 Update 2.

References

<http://www.securityfocus.com/archive/1/485100&gt;

Limitations

Exploit works on Novell GroupWise Client 6.5.6 and requires a user to reply to or forward the exploit e-mail.

The HTML Preview option must be enabled in Novell GroupWise Client in order for this exploit to succeed.

Platforms

Windows 2000
Windows XP

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

0.37 Low

EPSS

Percentile

97.2%

Related for SAINT:7B4967F5E04185CF6EC53575760456A5