Novell.GroupWise.Messenger.Client.Unicode.Stack.Buffer.Overflow

description-logoDescription

This indicates an attack attempt against a stack Buffer Overflow vulnerability in Novell GroupWise Messenger Client.
The vulnerability is caused by an improper boundary check when the vulnerable software handles a .nmx file with a malicious "name" property in the "" node. A remote attacker can exploit this to exploit this to execute arbitrary code within the context of the application or possibly cause a denial of service condition, via a crafted .nmx file.

affected-products-logoAffected Products

Novell GroupWise Messenger 2.0
Novell GroupWise Messenger 2.0.3
Novell GroupWise Messenger 2.1

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are not aware of any vendor supplied patch for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)