// For flags

CVE-2006-0992

Novell GroupWise Messenger Accept-Language Buffer Overflow Vulnerability

Severity Score

10.0
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

2
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier.

This vulnerability allows attackers to execute arbitrary code on vulnerable installations of the Novell GroupWise Messenger. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the Novell Messaging Agent, a web server that listens by default on TCP port 8300. Insufficient length checks during the parsing of long parameters within the Accept-Language header results in an exploitable stack overflow under the context of the SYSTEM user.

*Credits: CIRT.DK
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2006-03-03 CVE Reserved
  • 2006-04-13 CVE Published
  • 2010-09-20 First Exploit
  • 2024-08-03 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Novell
Search vendor "Novell"
Groupwise Messenger
Search vendor "Novell" for product "Groupwise Messenger"
2.0
Search vendor "Novell" for product "Groupwise Messenger" and version "2.0"
-
Affected