[8035] in bugtraq

home help back first fref pref prev next nref lref last post

Re: NMRC Advisory - GroupWise Buffer Overflow

daemon@ATHENA.MIT.EDU (Randy Richardson)
Sat Sep 26 22:12:37 1998

Date: 	Fri, 25 Sep 1998 20:44:45 -0800
Reply-To: randy@INTER-CORPORATE.COM
From: Randy Richardson <randy@INTER-CORPORATE.COM>
X-To:         Simple Nomad <thegnome@NMRC.ORG>
To: BUGTRAQ@NETSPACE.ORG
In-Reply-To:  <Pine.LNX.3.96.980322013136.155C-100000@vortex.nmrc.org>

[Snip]
> Synopsis
> --------
>
> A remote buffer overflow condition exists in Novell Groupwise Internet
> Gateway that permits DoS attacks and possible execution of malicious code.
> The overflow happens in the string parsing of the USER command in the POP3
> daemon, and in the command parsing of the LDAP daemon.
>
> Tested configuration
> --------------------
>
> The bug was tested with the following configuration :
>
> Novell Intranetware
> Intranetware Service Pack 5
> TCP/IP TCPN05 patch
> Novell BorderManager 2.1.0
> BorderManager Service pack 2.0D
> GroupWise 5.2
> GroupWise Service pack 3
>
> Bug(s) report
> -------------
[Snip]

        Does this bug also exist in GroupWise 5.5?

Randy Richardson - randy@inter-corporate.com
Inter-Corporate Computer & Network Services, Inc.
Vancouver, British Columbia, Canada
http://www.inter-corporate.com/

"Where do YOU want to Authenticate today?"

home help back first fref pref prev next nref lref last post