Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability
RISK: Medium Risk
TYPE: Clients - Email Clients
A vulnerability has been identified in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.
The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.
Successful exploitation may allow execution of arbitrary code, but requires tricking a user into opening a malicious file.
Impact
- Remote Code Execution
System / Technologies affected
- Novell GroupWise Client 8.x
- Novell GroupWise Server 8.x
Solutions
Before installation of the software, please visit the software manufacturer web-site for more details.
- Update to version 8.02 post-HP3 FTF.
Vulnerability Identifier
Source
Related Link
Share with