| Vulnerability Name: | CVE-2005-2346 (CCN-21560) | ||||||||
| Assigned: | 2005-07-26 | ||||||||
| Published: | 2005-07-26 | ||||||||
| Updated: | 2016-10-18 | ||||||||
| Summary: | Buffer overflow in Novell GroupWise 6.5 Client allows remote attackers to execute arbitrary code via a GWVW02xx.INI language file with a long entry, as demonstrated using a long ES02TKS.VEW value in the Group Task section. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Denial of Service | ||||||||
| References: | Source: CCN Type: Full-Disclosure Mailing List, Tue Jul 26 2005 - 23:20:16 CDT Novell GroupWise Client Remote Buffer Overflow Source: MITRE Type: CNA CVE-2005-2346 Source: BUGTRAQ Type: UNKNOWN 20050727 [ISR] - Novell GroupWise Client Remote Buffer Overflow Source: CCN Type: Novell Technical Information Document TID10098314 Buffer overflow in client Source: CONFIRM Type: Patch http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098314.htm Source: CCN Type: Novell Technical Information Document TID2971927 FTF: GroupWise 6.5 SP5 Client rev 6 EN Only - TID2971927 Source: CCN Type: Novell GroupWise Web site NOVELL: Novell GroupWise Source: CCN Type: OSVDB ID: 18298 Novell GroupWise Client ofview File Parsing Overflow Source: CCN Type: BID-14398 Novell GroupWise Client Remote Buffer Overflow Vulnerability Source: XF Type: UNKNOWN novellgroupwise-postoffice-dos(21560) | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||