First published: Wed Aug 03 2005(Updated: )
Buffer overflow in Novell GroupWise 6.5 Client allows remote attackers to execute arbitrary code via a GWVW02xx.INI language file with a long entry, as demonstrated using a long ES02TKS.VEW value in the Group Task section.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell GroupWise | =6.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2346 is classified as a high severity vulnerability due to its potential to allow remote attackers to execute arbitrary code.
To fix CVE-2005-2346, update to a patched version of Novell GroupWise that resolves the buffer overflow issue.
CVE-2005-2346 affects Novell GroupWise version 6.5.
Yes, CVE-2005-2346 can be exploited remotely by attackers using specially crafted language files.
Exploiting CVE-2005-2346 can lead to arbitrary code execution on the affected system, potentially compromising sensitive data.