First published: Wed Oct 04 2006(Updated: )
Messenger Agents (nmma.exe) in Novell GroupWise 2.0.2 and 1.0.6 allows remote attackers to cause a denial of service (crash) via a crafted HTTP POST request to TCP port 8300 with a modified val parameter, which triggers a null dereference related to "zero-size strings in blowfish routines."
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell GroupWise Messenger | =2.0.2 | |
Novell GroupWise Messenger | =1.0.6 | |
=1.0.6 | ||
=2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-4511 has a severity rating that indicates it can lead to a denial of service, potentially impacting the availability of the Novell GroupWise Messenger.
To mitigate CVE-2006-4511, it is recommended to update to a patched version of Novell GroupWise Messenger that addresses this vulnerability.
CVE-2006-4511 specifically affects users of Novell GroupWise Messenger versions 1.0.6 and 2.0.2.
The primary symptom of CVE-2006-4511 is an unexpected crash of the messenger service when it receives a specially crafted HTTP POST request.
An attacker can exploit CVE-2006-4511 by sending a modified val parameter in an HTTP POST request to the affected service running on port 8300.