CVE-2005-2804

GroupWise 6.5.3 - DoS

Title source: llm
STIX 2.1

Description

Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote attackers to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key.

Exploits (1)

exploitdb WRITEUP VERIFIED
by Francisco Amato · textdoswindows
https://www.exploit-db.com/exploits/26301

References (11)

Core 11
Core References
Third Party Advisory mailing-list x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0763.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_osvdb
http://www.osvdb.org/19862
Third Party Advisory, VDB Entry vdb-entry x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22419
Patch, Vendor Advisory mailing-list x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037442.html
Various Sources x_refsource_misc
http://www.infobyte.com.ar/adv/ISR-13.html
Third Party Advisory, VDB Entry vdb-entry x_refsource_sectrack
http://securitytracker.com/id?1014977
Exploit, Patch vdb-entry x_refsource_bid
http://www.securityfocus.com/bid/14952
Mailing List mailing-list x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=112784386426802&w=2
Third Party Advisory third-party-advisory x_refsource_sreason
http://securityreason.com/securityalert/28

Scores

EPSS 0.0530
EPSS Percentile 90.1%

Details

Status published
Products (1)
novell/groupwise 6.5.3
Published Oct 04, 2005
Tracked Since Feb 18, 2026