Novell.GroupWise.Messenger.NMX.File.Handling.Buffer.Overflow

description-logoDescription

This indicates an attack attempt against a Buffer Overflow vulnerability in Novell Groupwise Messenger.
The vulnerability is caused by an error when the vulnerable software handles a malicious ".nmx" contacts file. It allows a remote attacker to execute arbitrary code via a crafted ".nmx" file.

affected-products-logoAffected Products

Novell GroupWise Messenger client 2.1.0 and earlier versions

Impact logoImpact

System Compromise: Remote attackers can gain control of vulnerable systems.

recomended-action-logoRecommended Actions

Currently we are unaware of any vendor supplied patch for this issue.

Telemetry logoTelemetry

Coverage

IPS (Regular DB)
IPS (Extended DB)

Version Updates

Date Version Detail
2023-08-09 25.618 Name:Novell.
Groupwise.
Messenger.
NMX.
File.
Handling.
Buffer.
Overflow:Novell.
GroupWise.
Messenger.
NMX.
File.
Handling.
Buffer.
Overflow