CVE-2009-1636
Published May 26, 2009
Last updated 6 years ago
Overview
- Description
- Multiple buffer overflows in the Internet Agent (aka GWIA) component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 allow remote attackers to execute arbitrary code via (1) a crafted e-mail address in an SMTP session or (2) an SMTP command.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:novell:groupwise:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FE640E9A-762B-4AF4-8677-818CBF16EA4E" }, { "criteria": "cpe:2.3:a:novell:groupwise:7.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A9FBB457-FDC0-485F-951A-C0A7661A92B0" }, { "criteria": "cpe:2.3:a:novell:groupwise:7.0:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "8661AFFB-5CAF-4D44-A617-E0330C764BDE" }, { "criteria": "cpe:2.3:a:novell:groupwise:7.0:sp3:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CF66EFEE-DAB2-4455-96F2-50D3E9456485" }, { "criteria": "cpe:2.3:a:novell:groupwise:7.0.0:sp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "422F4B8A-8133-4DE2-9749-41E3DE0031DB" }, { "criteria": "cpe:2.3:a:novell:groupwise:7.0.0:sp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD25DC76-F3BE-4A0E-86DC-D27F4948446E" }, { "criteria": "cpe:2.3:a:novell:groupwise:7.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD0AA3F3-6BE4-4CCC-838F-E8BD1F06590B" }, { "criteria": "cpe:2.3:a:novell:groupwise:7.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D3BCF9F-9CDA-4DFD-AC39-2624BCFAAD96" }, { "criteria": "cpe:2.3:a:novell:groupwise:7.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "86DB474F-D101-4210-9DC1-7230E9CAE80D" }, { "criteria": "cpe:2.3:a:novell:groupwise:7.03:hp1a:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "84293DF8-D11D-4CB4-99EC-EB60AF027B8C" }, { "criteria": "cpe:2.3:a:novell:groupwise:7.03:hp2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C4D63B03-C0A1-4366-B853-0D36CA0E6912" }, { "criteria": "cpe:2.3:a:novell:groupwise:8.0:hp1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "97206FE4-E1F1-40EC-BC01-A0125FB3B20F" } ], "operator": "OR" } ] } ]