CVE-2016-5762

Integer overflow in the Post Office Agent in Novell GroupWise before 2014 R2 Service Pack 1 Hot Patch 1 might allow remote attackers to execute arbitrary code via a long (1) username or (2) password, which triggers a heap-based buffer overflow.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:groupwise:*:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:2014:-:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:2014:r2:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:2014:sp1:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:2014:sp2:*:*:*:*:*:*

History

21 Nov 2024, 02:54

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html - () http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html -
References () http://seclists.org/fulldisclosure/2016/Aug/123 - () http://seclists.org/fulldisclosure/2016/Aug/123 -
References () http://www.securityfocus.com/archive/1/539296/100/0/threaded - () http://www.securityfocus.com/archive/1/539296/100/0/threaded -
References () http://www.securityfocus.com/bid/92642 - () http://www.securityfocus.com/bid/92642 -
References () https://www.novell.com/support/kb/doc.php?id=7017975 - () https://www.novell.com/support/kb/doc.php?id=7017975 -
References () https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt - () https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt -

07 Nov 2023, 02:33

Type Values Removed Values Added
References (BUGTRAQ) http://www.securityfocus.com/archive/1/539296/100/0/threaded - Third Party Advisory, VDB Entry () http://www.securityfocus.com/archive/1/539296/100/0/threaded -
References (CONFIRM) https://www.novell.com/support/kb/doc.php?id=7017975 - Vendor Advisory () https://www.novell.com/support/kb/doc.php?id=7017975 -
References (BID) http://www.securityfocus.com/bid/92642 - Third Party Advisory, VDB Entry () http://www.securityfocus.com/bid/92642 -
References (FULLDISC) http://seclists.org/fulldisclosure/2016/Aug/123 - Mailing List, Third Party Advisory, VDB Entry () http://seclists.org/fulldisclosure/2016/Aug/123 -
References (MISC) http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html - Exploit, Third Party Advisory, VDB Entry () http://packetstormsecurity.com/files/138503/Micro-Focus-GroupWise-Cross-Site-Scripting-Overflows.html -
References (MISC) https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt - Exploit, Third Party Advisory, VDB Entry () https://www.sec-consult.com/fxdata/seccons/prod/temedia/advisories_txt/20160825-0_Micro_Focus_GroupWise_Multiple_vulnerabilities_v10.txt -

Information

Published : 2017-04-20 17:59

Updated : 2024-11-21 02:54


NVD link : CVE-2016-5762

Mitre link : CVE-2016-5762

CVE.ORG link : CVE-2016-5762


JSON object : View

Products Affected

novell

  • groupwise
CWE
CWE-190

Integer Overflow or Wraparound