Vulnerability Name:

CVE-2005-2804 (CCN-22419)

Assigned:2005-09-27
Published:2005-09-27
Updated:2017-07-11
Summary:Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote attackers to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key.
CVSS v3 Severity:4.0 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
2.1 Low (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: Full-Disclosure Mailing List, Tue Sep 27 2005 - 08:57:57 CDT
Novell GroupWise Client Integer Overflow

Source: FULLDISC
Type: UNKNOWN
20050927 Re: [ISR] - Novell GroupWise Client Integer Overflow

Source: MITRE
Type: CNA
CVE-2005-2804

Source: FULLDISC
Type: Patch, Vendor Advisory
20050927 [ISR] - Novell GroupWise Client Integer Overflow

Source: BUGTRAQ
Type: UNKNOWN
20050927 [ISR] - Novell GroupWise Client Integer Overflow

Source: SREASON
Type: UNKNOWN
28

Source: CCN
Type: SECTRACK ID: 1014977
Novell GroupWise Client Integer Overflow in Processing `IP Port` Registry Key May Let Local Users Execute Arbitrary Code

Source: SECTRACK
Type: UNKNOWN
1014977

Source: CONFIRM
Type: UNKNOWN
http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098814.htm

Source: CCN
Type: Novell Technical Information Document 2972191
FTF: GroupWise 6.5 SP5 Client rev 9 EN Only - TID2972191

Source: CONFIRM
Type: Patch, Vendor Advisory
http://support.novell.com/techcenter/search/search.do?cmd=displayKC&docType=%20c&externalId=10098814html&sliceId=&dialogID=717171

Source: MISC
Type: UNKNOWN
http://www.infobyte.com.ar/adv/ISR-13.html

Source: CCN
Type: Novell GroupWise Web site
NOVELL: Novell GroupWise

Source: OSVDB
Type: UNKNOWN
19862

Source: CCN
Type: OSVDB ID: 19862
Novell GroupWise Client IP Port Registry Key Parsing Overflow

Source: BID
Type: Exploit, Patch
14952

Source: CCN
Type: BID-14952
Novell GroupWise Client Local Integer Overflow Vulnerability

Source: XF
Type: UNKNOWN
novell-groupwise-port-number-overflow(22419)

Source: XF
Type: UNKNOWN
novell-groupwise-port-number-overflow(22419)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:groupwise:6.5.3:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:groupwise:6.5.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell groupwise 6.5.3
    novell groupwise 6.5.3