Novell.GroupWise.mailto.URI.Handler.Buffer.Overflow
Description
This indicates a buffer overflow vulnerability in Novell GroupWise. This vulnerability is caused by a buffer overflow error when processing overly long "mailto:" URIs, which could be exploited by attackers to crash an affected application or execute arbitrary code by tricking a user into following a specially crafted link or opening a malicious HTML attachment.
Affected Products
Novell Groupwise 7.0
Impact
System Compromise
Denial of Service
Recommended Actions
Contact your vendor for upgrade or patch information:
http://www.novell.com/products/groupwise/.
Telemetry
Coverage
IPS (Regular DB) | |
IPS (Extended DB) |
Version Updates
Date | Version | Detail |
---|---|---|
2023-08-09 | 25.618 | Name:Novell. Groupwise. mailto. URI. Handler. Buffer. Overflow:Novell. GroupWise. mailto. URI. Handler. Buffer. Overflow |
2021-01-11 | 16.995 |