HTTP: Novell GroupWise Client Buffer Overflow

This signature detects attempts to use unsafe ActiveX controls in Novell GroupWise Client "gxmim1.dll." An attacker can create a malicious Web site containing Web pages with dangerous ActiveX controls, which if accessed by a victim, allows the attacker to gain control of the victim's client browser.

Extended Description

Novell GroupWise Client is prone to an unspecified buffer-overflow vulnerability because the application fails to perform adequate boundary checks on user-supplied data. Successful exploits allow remote attackers to execute arbitrary code in the context of the application using the ActiveX control (typically Internet Explorer). Failed exploit attempts will likely result in denial-of-service conditions. Novell GroupWise Client 7.0.3.1294 is vulnerable; other versions may also be affected.

Affected Products

Novell groupwise_client

References

BugTraq: 36398

Short Name
HTTP:STC:ACTIVEX:GRPWISE-GIXMIM
Severity
Major
Recommended
False
Recommended Action
Drop
Category
HTTP
Keywords
Buffer Client GroupWise Novell Overflow bid:36398
Release Date
11/09/2009
Supported Platforms

srx-branch-12.3

srx-19.3

srx-branch-19.3

vsrx3bsd-19.2

srx-branch-19.4

vsrx-19.4

mx-12.3

mx-19.4

vmx-19.4

mx-19.3

vsrx3bsd-19.4

srx-19.4

vsrx-12.3

vmx-19.3

vsrx-19.2

srx-12.3

Sigpack Version
3336
False Positive
Unknown
Vendors

Novell

Found a potential security threat?