CVE-2005-2804
CVSS5.0
发布时间 :2005-10-04 17:02:00
修订时间 :2016-10-17 23:30:32
NMCO    

[原文]Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote attackers to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key.


[CNNVD]Novell GroupWise客户端本地整数溢出漏洞(CNNVD-200510-004)

        Novell GroupWise是一款跨平台协作软件。
        GroupWise注册表解析代码中存在整数溢出漏洞,攻击者可以通过修改某些键值创建整数溢出,导致崩溃或执行任意代码。起因是应用程序没能安全的解析windows注册表中保存的最后认证的端口数。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-2804
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-2804
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200510-004
(官方数据源) CNNVD

- 其它链接及资源

http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0763.html
(UNKNOWN)  FULLDISC  20050927 Re: [ISR] - Novell GroupWise Client Integer Overflow
http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037442.html
(VENDOR_ADVISORY)  FULLDISC  20050927 [ISR] - Novell GroupWise Client Integer Overflow
http://marc.info/?l=bugtraq&m=112784386426802&w=2
(UNKNOWN)  BUGTRAQ  20050927 [ISR] - Novell GroupWise Client Integer Overflow
http://securityreason.com/securityalert/28
(UNKNOWN)  SREASON  28
http://securitytracker.com/id?1014977
(UNKNOWN)  SECTRACK  1014977
http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098814.htm
(UNKNOWN)  CONFIRM  http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098814.htm
http://support.novell.com/techcenter/search/search.do?cmd=displayKC&docType=%20c&externalId=10098814html&sliceId=&dialogID=717171
(VENDOR_ADVISORY)  CONFIRM  http://support.novell.com/techcenter/search/search.do?cmd=displayKC&docType=%20c&externalId=10098814html&sliceId=&dialogID=717171
http://www.infobyte.com.ar/adv/ISR-13.html
(UNKNOWN)  MISC  http://www.infobyte.com.ar/adv/ISR-13.html
http://www.securityfocus.com/bid/14952
(PATCH)  BID  14952
http://xforce.iss.net/xforce/xfdb/22419
(PATCH)  XF  novell-groupwise-port-number-overflow(22419)

- 漏洞信息

Novell GroupWise客户端本地整数溢出漏洞
中危 缓冲区溢出
2005-10-04 00:00:00 2005-10-20 00:00:00
本地  
        Novell GroupWise是一款跨平台协作软件。
        GroupWise注册表解析代码中存在整数溢出漏洞,攻击者可以通过修改某些键值创建整数溢出,导致崩溃或执行任意代码。起因是应用程序没能安全的解析windows注册表中保存的最后认证的端口数。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972191.htm

- 漏洞信息

19862
Novell GroupWise Client IP Port Registry Key Parsing Overflow
Local Access Required Input Manipulation
Loss of Integrity
Exploit Unknown

- 漏洞描述

A local overflow exists in Novell GroupWise Client. The GroupWise Client fails to parse the 'IP Port' registry key resulting in a integer overflow. With a specially crafted Windows Registry key, an attacker can cause arbitrary code execution on the local system resulting in a loss of integrity.

- 时间线

2005-09-27 2005-07-28
Unknow Unknow

- 解决方案

Upgrade to version 6.5 (dated after 8/10/2005) or 6.5 SP5 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站