Vulnerability Name: | CVE-2013-1085 (CCN-82889) | ||||||||
Assigned: | 2013-03-14 | ||||||||
Published: | 2013-03-14 | ||||||||
Updated: | 2013-03-29 | ||||||||
Summary: | Stack-based buffer overflow in the nim: protocol handler in Novell GroupWise Messenger 2.04 and earlier, and Novell Messenger 2.1.x and 2.2.x before 2.2.2, allows remote attackers to execute arbitrary code via an import command containing a long string in the filename parameter. Per http://www.novell.com/support/kb/doc.php?id=7011935 Affected versions: Novell Messenger 2.2.1 (and earlier) Novell Messenger 2.1 (and earlier) GroupWise Messenger 2.04 (and earlier) | ||||||||
CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
5.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-119 | ||||||||
Vulnerability Consequences: | Gain Access | ||||||||
References: | Source: MITRE Type: CNA CVE-2013-1085 Source: CCN Type: SA52626 Novell Messenger / Groupwise Messenger Client Unspecified Buffer Overflow Vulnerability Source: CCN Type: Novell Document ID: 7011935 Novell Messenger Client for Windows Buffer Overflow Vulnerability Source: CONFIRM Type: Vendor Advisory http://www.novell.com/support/kb/doc.php?id=7011935 Source: CCN Type: BID-58529 Novell Messenger Client CVE-2013-1085 Buffer Overflow Vulnerability Source: MISC Type: UNKNOWN http://www.zerodayinitiative.com/advisories/ZDI-13-036/ Source: CONFIRM Type: UNKNOWN https://bugzilla.novell.com/show_bug.cgi?id=777352 Source: XF Type: UNKNOWN novell-messenger-client-unspec-bo(82889) Source: CCN Type: ZDI-13-036 Novell GroupWise Messenger import Command Remote Code Execution Vulnerability | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration 2: Configuration 3: Configuration CCN 1: ![]() | ||||||||
BACK |