GO-Global for Windows _USERSA_ Remote Overflow

Critical Nessus Plugin ID 20178


The remote display server is affected by a buffer overflow vulnerability.


The remote host appears to be running a version of the GO-Global remote display server that fills a small buffer with user-supplied data without first checking its size. An attacker can leverage this issue to overflow the buffer, causing the server to crash and possibly even allowing for arbitrary code execution on the remote host.


Upgrade to GO-Global version or later.

See Also


Plugin Details

Severity: Critical

ID: 20178

File Name: go_global_overflow.nasl

Version: $Revision: 1.17 $

Type: remote

Agent: windows

Family: Windows

Published: 2005/11/10

Modified: 2017/06/26

Dependencies: 20177

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:C

Vulnerability Information

CPE: x-cpe:/a:graphon:go-global

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2005/11/02

Reference Information

CVE: CVE-2005-3483

BID: 15285

OSVDB: 20464