Page 2 of 6 results (0.008 seconds)

CVSS: 10.0EPSS: 39%CPEs: 1EXPL: 2

Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier. This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Novell GroupWise Messenger. Authentication is not required to exploit this vulnerability. The specific flaw exists within the Novell Messaging Agent, a web server that listens by default on TCP port 8300. • https://www.exploit-db.com/exploits/16757 http://cirt.dk/advisories/cirt-42-advisory.txt http://metasploit.blogspot.com/2006/04/exploit-development-groupwise_14.html http://secunia.com/advisories/19663 http://securitytracker.com/id?1015911 http://support.novell.com/cgi-bin/search/searchtid.cgi?10100861.htm http://www.osvdb.org/24617 http://www.securityfocus.com/archive/1/430911/100/0/threaded http://www.securityfocus.com/bid/17503 http://www.vupen.com/english/advisories/2006 •