Stack-based buffer overflow in the nim: protocol handler in Novell GroupWise Messenger 2.04 and earlier, and Novell Messenger 2.1.x and 2.2.x before 2.2.2, allows remote attackers to execute arbitrary code via an import command containing a long string in the filename parameter.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 01:48
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.novell.com/support/kb/doc.php?id=7011935 - Vendor Advisory | |
References | () http://www.zerodayinitiative.com/advisories/ZDI-13-036/ - | |
References | () https://bugzilla.novell.com/show_bug.cgi?id=777352 - |
Information
Published : 2013-03-29 16:09
Updated : 2024-11-21 01:48
NVD link : CVE-2013-1085
Mitre link : CVE-2013-1085
CVE.ORG link : CVE-2013-1085
JSON object : View
Products Affected
novell
- groupwise_messenger
- messenger
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer