Novell GroupWise Messenger Client < 2.0.3 HP1 Multiple Remote Overflows

This script is Copyright (C) 2008-2016 Tenable Network Security, Inc.


Synopsis :

The remote Windows host has an application that is affected by
multiple buffer overflow vulnerabilities.

Description :

The remote host is running GroupWise Messenger Client from Novell.

The installed version is affected by multiple buffer overflow
vulnerabilities. By sending specially crafted spoofed server responses
to valid client requests, it may be possible to execute arbitrary code
within the context of the application or cause a denial of service
condition.

See also :

http://download.novell.com/Download?buildid=HHSfPO91pLQ~

Solution :

Upgrade to Novell GroupWise Messenger Client 2.0.3 HP1.

Risk factor :

High / CVSS Base Score : 7.6
(CVSS2#AV:N/AC:H/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 6.0
(CVSS2#E:POC/RL:OF/RC:C)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 33141 (groupwise_msngr_client_buffer_overflow.nasl)

Bugtraq ID: 29602

CVE ID: CVE-2008-2703
CVE-2008-2704

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now