|Title:||Novell Groupwise Client ActiveX Control Buffer Overflow Vulnerability|
|Summary:||Check the version of Novell Groupwise Client ActiveX control|
Overview: This host is installed with Novell Groupwise Client ActiveX Control
and is prone to Buffer Overflow vulnerability.
A boundary error occurs in Novell Groupwise Client ActiveX control (gxmim1.dll)
while handling overly long arguments passed to the 'SetFontFace()' method.
Successful expoitation will allow remote attackers to execute arbitrary
code on the affected system and may crash the client.
Novell GroupWise Client 188.8.131.524 and prior on Windows.
No solution or patch is available as of 09th November, 2009. Information
regarding this issue will be updated once the solution details are available.
For further updates refer, http://www.novell.com/products/groupwise/
Set the Killbit for the vulnerable CLSID
BugTraq ID: 36398|
Common Vulnerability Exposure (CVE) ID: CVE-2009-3863
|Copyright||Copyright (C) 2009 Greenbone Networks GmbH|
|This is only one of 40605 vulnerability tests in our test suite. Find out more about running a complete security audit.|
To run a free test of this vulnerability against your system, register below.