Description
Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote attackers to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key.
Exploits (1)
exploitdb
WRITEUP
VERIFIED
by Francisco Amato · textdoswindows
https://www.exploit-db.com/exploits/26301
References (11)
Core 11
Core References
Third Party Advisory mailing-list
x_refsource_fulldisc
http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0763.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_osvdb
http://www.osvdb.org/19862
Vendor Advisory x_refsource_confirm
http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098814.htm
Patch, Vendor Advisory x_refsource_confirm
http://support.novell.com/techcenter/search/search.do?cmd=displayKC&docType=%20c&externalId=10098814html&sliceId=&dialogID=717171
Third Party Advisory, VDB Entry vdb-entry
x_refsource_xf
https://exchange.xforce.ibmcloud.com/vulnerabilities/22419
Patch, Vendor Advisory mailing-list
x_refsource_fulldisc
http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037442.html
Various Sources x_refsource_misc
http://www.infobyte.com.ar/adv/ISR-13.html
Third Party Advisory, VDB Entry vdb-entry
x_refsource_sectrack
http://securitytracker.com/id?1014977
Exploit, Patch vdb-entry
x_refsource_bid
http://www.securityfocus.com/bid/14952
Mailing List mailing-list
x_refsource_bugtraq
http://marc.info/?l=bugtraq&m=112784386426802&w=2
Third Party Advisory third-party-advisory
x_refsource_sreason
http://securityreason.com/securityalert/28
Scores
EPSS
0.0530
EPSS Percentile
90.1%
Details
Status
published
Products (1)
novell/groupwise
6.5.3
Published
Oct 04, 2005
Tracked Since
Feb 18, 2026