First published: Thu Dec 08 2011(Updated: )
The server process in Novell Messenger 2.1 and 2.2.x before 2.2.1, and Novell GroupWise Messenger 2.04 and earlier, allows remote attackers to read from arbitrary memory locations via a crafted command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell GroupWise Messenger | =2.0.2 | |
Novell GroupWise Messenger | =2.2.0 | |
Novell GroupWise Messenger | =1.0.6 | |
Novell GroupWise Messenger | =2.1 | |
Novell GroupWise Messenger | =2.0.3 | |
Novell GroupWise Messenger | <=2.0.4 | |
Novell GroupWise Messenger | =2.0 | |
Novell GroupWise Messenger | =2.0.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-3179 has a severity rating that indicates it allows remote attackers to read from arbitrary memory locations.
To mitigate CVE-2011-3179, upgrade to Novell Messenger version 2.2.1 or later or to a secure version of Novell GroupWise Messenger.
CVE-2011-3179 affects Novell Messenger versions 2.1 and 2.2.x before 2.2.1 and Novell GroupWise Messenger versions 2.0.4 and earlier.
CVE-2011-3179 is a memory disclosure vulnerability that allows attackers to read sensitive information from memory.
Yes, CVE-2011-3179 can be exploited remotely, allowing attackers to affect the target without direct access.