Integer overflow in the Post Office Agent in Novell GroupWise before 2014 R2 Service Pack 1 Hot Patch 1 might allow remote attackers to execute arbitrary code via a long (1) username or (2) password, which triggers a heap-based buffer overflow.
References
Link | Resource |
---|---|
https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt | Exploit Third Party Advisory VDB Entry |
https://www.novell.com/support/kb/doc.php?id=7017975 | Vendor Advisory |
http://www.securityfocus.com/bid/92642 | Third Party Advisory VDB Entry |
http://seclists.org/fulldisclosure/2016/Aug/123 | Mailing List Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html | Exploit Third Party Advisory VDB Entry |
http://www.securityfocus.com/archive/1/539296/100/0/threaded | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2017-04-20 10:59
Updated : 2019-05-30 07:24
NVD link : CVE-2016-5762
Mitre link : CVE-2016-5762
JSON object : View
CWE
CWE-190
Integer Overflow or Wraparound
Products Affected
novell
- groupwise