This script is Copyright (C) 2012 Tenable Network Security, Inc.
The remote Windows host contains an email application that is
affected by a remote buffer overflow vulnerability.
The version of Novell GroupWise Client 8.x installed on the remote
Windows host is earlier than 8.0.2 post-HP3. As such, it is
reportedly affected by a buffer overflow vulnerability when parsing an
Address Book (.nab) file with an overly long email address.
By tricking a user into opening a specially crafted Address Book file,
a remote, unauthenticated attacker could potentially execute arbitrary
code on the remote host subject to the privileges of the user running
the affected application.
See also :
Upgrade to Novell GroupWise Client 8.0.2 post-HP3 (188.8.131.5283) or later.
Risk factor :
High / CVSS Base Score : 9.3
CVSS Temporal Score : 7.3
Public Exploit Available : true