Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2008-2703Improper Restriction of Operations within the Bounds of a Memory Buffer in Groupwise Messenger

Severity
10.0CRITICALNVD
EPSS
80.2%
top 0.88%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Affected products
Timeline
PublishedJun 13
Latest updateMay 1

Description

Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 2.0.3 HP1 for Windows allow remote attackers to execute arbitrary code via "spoofed server responses" that contain a long string after the NM_A_SZ_TRANSACTION_ID field name.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages1 packages

NVDnovell/groupwise_messenger2.0, 2.0.2, 2.0.3+2

Patches

🔴Vulnerability Details

2
GHSA
GHSA-6xqf-p6pc-2r56: Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 22022-05-01
CVEList
CVE-2008-2703: Multiple stack-based buffer overflows in Novell GroupWise Messenger (GWIM) Client before 22008-06-13

💥Exploits & PoCs

2
Exploit-DB
Novell Groupwise Messenger Client - Remote Buffer Overflow (Metasploit)2010-06-22
Exploit-DB
Novell Groupwise Messenger 2.0 Client - Buffer Overflow2008-07-02