First published: Tue Feb 03 2009(Updated: )
Off-by-one error in the SMTP daemon in GroupWise Internet Agent (GWIA) in Novell GroupWise 6.5x, 7.0, 7.01, 7.02, 7.03, 7.03HP1a, and 8.0 allows remote attackers to execute arbitrary code via a long e-mail address in a malformed RCPT command, leading to a buffer overflow.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell GroupWise | =7.0 | |
Novell GroupWise | =7.02x | |
Novell GroupWise | =8.0 | |
Novell GroupWise | =7.01 | |
Novell GroupWise | =6.5 | |
Novell GroupWise | =7.03-hp1a | |
Novell GroupWise | =7.03 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-0410 has a critical severity rating due to its potential for remote code execution.
To fix CVE-2009-0410, apply the latest patches or updates provided by Novell for affected GroupWise versions.
CVE-2009-0410 affects Novell GroupWise versions 6.5, 7.0, 7.01, 7.02, 7.03, 7.03HP1a, and 8.0.
CVE-2009-0410 is an off-by-one error that leads to a buffer overflow vulnerability.
Yes, CVE-2009-0410 can be exploited remotely through a specially crafted email.