GO-Global for Windows _USERSA_ Remote Overflow (credentialed check)

Critical Nessus Plugin ID 20179


The remote display client or server is affected by a buffer overflow vulnerability.


According to the Windows registry, the remote host is running a version of the GO-Global remote display client or server that fills a small buffer with user-supplied data without first checking its size.
An attacker can leverage this issue to overflow the buffer, causing the server to crash and possibly even allowing for arbitrary code execution on the remote host.


Upgrade to GO-Global version or later.

See Also


Plugin Details

Severity: Critical

ID: 20179

File Name: go_global_overflow_creds.nasl

Version: $Revision: 1.20 $

Type: local

Agent: windows

Family: Windows

Published: 2005/11/10

Modified: 2017/06/26

Dependencies: 13855

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 9.5

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:F/RL:U/RC:C

Vulnerability Information

CPE: x-cpe:/a:graphon:go-global

Required KB Items: SMB/Registry/Enumerated

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2005/11/02

Reference Information

CVE: CVE-2005-3483

BID: 15285

OSVDB: 20464