Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote attackers to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key.
Link | Tags |
---|---|
http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0763.html | mailing list |
http://www.osvdb.org/19862 | vdb entry |
http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098814.htm | |
http://support.novell.com/techcenter/search/search.do?cmd=displayKC&docType=%20c&externalId=10098814html&sliceId=&dialogID=717171 | patch vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/22419 | vdb entry |
http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037442.html | mailing list patch vendor advisory |
http://www.infobyte.com.ar/adv/ISR-13.html | |
http://securitytracker.com/id?1014977 | vdb entry |
http://www.securityfocus.com/bid/14952 | exploit vdb entry patch |
http://marc.info/?l=bugtraq&m=112784386426802&w=2 | mailing list |
http://securityreason.com/securityalert/28 | third party advisory |