Skip to main content

Novell GroupWise "mailto:" URI Remote Buffer Overflow Vulnerability

Last Update Date: 28 Jan 2011 Release Date: 2 May 2008 4392 Views

RISK: Medium Risk

A vulnerability has been identified in Novell GroupWise, which could be exploited by remote attackers to cause a denial of service or take complete control of an affected system. This issue is caused by a buffer overflow error when processing overly long "mailto:" URIs, which could be exploited by attackers to crash an affected application or execute arbitrary code by tricking a user into following a specially crafted link or opening a malicious HTML attachment.


Impact

  • Denial of Service
  • Remote Code Execution

System / Technologies affected

  • Novell GroupWise version 7.0 and prior

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • There is no patch available for this vulnerability currently.


Vulnerability Identifier

  • No CVE information is available

Source


Related Link