APP: Novell GroupWise Messenger HTTP Response Handling Stack Overflow

This signature detects attempts to exploit a known vulnerability in Novell GroupWise Messenger. It is due to improper handling of crafted HTTP responses. An unauthenticated remote attacker can exploit this vulnerability by sending spoofed HTTP responses to the target host. Successful attack could allow for arbitrary code execution with privileges of the currently logged in user. In an attack case where code injection is not successful, the affected application will terminate.

Extended Description

Novell GroupWise Messenger is prone to two buffer-overflow vulnerabilities because it fails to adequately bounds-check user-supplied data before copying it to an insufficiently sized buffer. Attackers can exploit these issues to execute arbitrary code within the context of the affected application. Failed exploit attempts will result in a denial-of-service condition. Versions prior to Novell GroupWise Messenger 2.0.3 HP1 are vulnerable.

Affected Products

Novell groupwise_messenger

Short Name
APP:NOVELL:GWCLIENT-BOF
Severity
Major
Recommended
False
Recommended Action
Drop
Category
APP
Keywords
CVE-2008-2703 GroupWise HTTP Handling Messenger Novell Overflow Response Stack bid:29602
Release Date
09/10/2013
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
Port
TCP/8300
False Positive
Unknown
Vendors

Novell

CVSS Score

10.0

Found a potential security threat?