CVE-2009-0410

Off-by-one error in the SMTP daemon in GroupWise Internet Agent (GWIA) in Novell GroupWise 6.5x, 7.0, 7.01, 7.02, 7.03, 7.03HP1a, and 8.0 allows remote attackers to execute arbitrary code via a long e-mail address in a malformed RCPT command, leading to a buffer overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:groupwise:6.5:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.0:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.01:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.02x:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.03:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.03:hp1a:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:8.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:59

Type Values Removed Values Added
References () http://download.novell.com/Download?buildid=GjZRRdqCFW0 - Patch () http://download.novell.com/Download?buildid=GjZRRdqCFW0 - Patch
References () http://secunia.com/advisories/33744 - Vendor Advisory () http://secunia.com/advisories/33744 - Vendor Advisory
References () http://www.novell.com/support/viewContent.do?externalId=7002502 - Vendor Advisory () http://www.novell.com/support/viewContent.do?externalId=7002502 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/500609/100/0/threaded - () http://www.securityfocus.com/archive/1/500609/100/0/threaded -
References () http://www.securityfocus.com/bid/33560 - () http://www.securityfocus.com/bid/33560 -
References () http://www.zerodayinitiative.com/advisories/ZDI-09-010/ - Patch () http://www.zerodayinitiative.com/advisories/ZDI-09-010/ - Patch

Information

Published : 2009-02-03 19:30

Updated : 2024-11-21 00:59


NVD link : CVE-2009-0410

Mitre link : CVE-2009-0410

CVE.ORG link : CVE-2009-0410


JSON object : View

Products Affected

novell

  • groupwise
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer