| Vulnerability Name: | CVE-2006-0992 (CCN-25828) | ||||||||
| Assigned: | 2006-04-13 | ||||||||
| Published: | 2006-04-13 | ||||||||
| Updated: | 2018-10-18 | ||||||||
| Summary: | Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. Note: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier. Upgrade to GroupWise Messenger, 2.0 Public Beta 2 to fix this issue. | ||||||||
| CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
| CVSS v2 Severity: | 10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: CCN Type: Full-Disclosure Mailing List, Thu Apr 13 2006 - 11:11:40 CDT ZDI-06-008: Novell GroupWise Messenger Accept-Language Buffer Overflow Source: MISC Type: UNKNOWN http://cirt.dk/advisories/cirt-42-advisory.txt Source: MITRE Type: CNA CVE-2006-0992 Source: MISC Type: UNKNOWN http://metasploit.blogspot.com/2006/04/exploit-development-groupwise_14.html Source: CCN Type: SA19663 Novell GroupWise Messenger Accept-Language Buffer Overflow Source: SECUNIA Type: UNKNOWN 19663 Source: CCN Type: SECTRACK ID: 1015911 Novell GroupWise Messenger Buffer Overflow in Accept-Language Header Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1015911 Source: CCN Type: Novell Technical Information Document TID10100861 GroupWise Messenger 2.0 Accept Language Buffer Overflow Source: CONFIRM Type: Patch http://support.novell.com/cgi-bin/search/searchtid.cgi?10100861.htm Source: OSVDB Type: UNKNOWN 24617 Source: CCN Type: OSVDB ID: 24617 Novell GroupWise Messenging Agent Accept-Language Header Remote Overflow Source: BUGTRAQ Type: UNKNOWN 20060413 ZDI-06-008: Novell GroupWise Messenger Accept-Language Buffer Overflow Source: BID Type: Patch 17503 Source: CCN Type: BID-17503 Novell GroupWise Messenger Accept Language Remote Buffer Overflow Vulnerability Source: VUPEN Type: UNKNOWN ADV-2006-1355 Source: MISC Type: Patch, Vendor Advisory http://www.zerodayinitiative.com/advisories/ZDI-06-008.html Source: XF Type: UNKNOWN groupwise-accept-language-bo(25828) Source: XF Type: UNKNOWN groupwise-accept-language-bo(25828) Source: EXPLOIT-DB Type: EXPLOIT Offensive Exploit Database [2006-04-15] Source: EXPLOIT-DB Type: UNKNOWN 1679 Source: CCN Type: ZDI-06-008 Novell GroupWise Messenger Accept-Language Buffer Overflow | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||