GO-Global for Windows _USERSA_ Remote Overflow (credentialed check)

This script is Copyright (C) 2005-2017 Tenable Network Security, Inc.


Synopsis :

The remote display client or server is affected by a buffer overflow
vulnerability.

Description :

According to the Windows registry, the remote host is running a
version of the GO-Global remote display client or server that fills a
small buffer with user-supplied data without first checking its size.
An attacker can leverage this issue to overflow the buffer, causing
the server to crash and possibly even allowing for arbitrary code
execution on the remote host.

See also :

http://seclists.org/fulldisclosure/2005/Nov/78

Solution :

Upgrade to GO-Global version 3.1.0.3281 or later.

Risk factor :

Critical / CVSS Base Score : 10.0
(CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 9.5
(CVSS2#E:F/RL:U/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 20179 (go_global_overflow_creds.nasl)

Bugtraq ID: 15285

CVE ID: CVE-2005-3483

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now