Vulnerability Details : CVE-2005-2804
Potential exploit
Integer overflow in the registry parsing code in GroupWise 6.5.3, and possibly earlier version, allows remote attackers to cause a denial of service (application crash) via a large TCP/IP port in the Windows registry key.
Vulnerability category: OverflowDenial of service
Products affected by CVE-2005-2804
- cpe:2.3:a:novell:groupwise:6.5.3:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2804
5.30%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 89 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2804
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
References for CVE-2005-2804
-
http://www.osvdb.org/19862
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/22419
-
http://securitytracker.com/id?1014977
-
http://archives.neohapsis.com/archives/fulldisclosure/2005-09/0763.html
-
http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098814.htm
-
http://www.infobyte.com.ar/adv/ISR-13.html
-
http://securityreason.com/securityalert/28
-
http://www.securityfocus.com/bid/14952
Exploit;Patch
-
http://support.novell.com/techcenter/search/search.do?cmd=displayKC&docType=%20c&externalId=10098814html&sliceId=&dialogID=717171
Patch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=112784386426802&w=2
-
http://lists.grok.org.uk/pipermail/full-disclosure/2005-September/037442.html
Patch;Vendor Advisory
Jump to