First published: Fri May 02 2008(Updated: )
Buffer overflow in Novell GroupWise 7 allows remote attackers to cause a denial of service or execute arbitrary code via a long argument in a mailto: URI.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell GroupWise | =7.0 | |
Novell GroupWise | =7.0-sp1 | |
Novell GroupWise | =7.0-sp3 | |
Novell GroupWise | =7.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-2069 is classified as a high severity vulnerability due to its potential for remote code execution.
To remediate CVE-2008-2069, upgrading to a patched version of Novell GroupWise that addresses the buffer overflow issue is recommended.
CVE-2008-2069 affects Novell GroupWise versions 7.0 and its service packs (SP1, SP2, SP3).
Yes, CVE-2008-2069 may allow attackers to execute arbitrary code, potentially leading to data breaches.
CVE-2008-2069 can be exploited through a malicious mailto: URI containing a long argument.