Korean
<< Back
VID 23149
Severity 40
Port 443,491
Protocol TCP
Class Daemon
Detailed Description The GO-Global server is vulnerable to a buffer overflow vulnerability which exist in versions 3.1.0.3270 and earlier. GO-Global for Windows makes it easy to publish your Windows applications to your network or the Web. GO-Global for Windows 3.1.0.3270 and earlier could allow a remote attacker to cause a buffer overflow via a data block that is longer than the specified data block size. A remote attacker could exploit this flaw to overflow the buffer, causing the server to crash and possibly even allowing for arbitrary code execution on the affected system.

* References:
http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038371.html
http://marc.theaimsgroup.com/?l=full-disclosure&m=113095918810489&w=2
http://aluigi.altervista.org/adv/ggwbof-adv.txt
http://www.frsirt.com/english/advisories/2005/2290
http://secunia.com/advisories/17424

* Platforms Affected:
GraphOn GO-Global version 3.1.0.3270 and earlier versions
Microsoft Windows Any version
Recommendation Upgrade to the latest version of GO-Global (3.1.0.3281 or later) available from the following GO-Global Web sites:

GO-Global Host for Windows:
http://www.graphon.com/download/host.shtml

GO-Global Client for Windows:
http://www.graphon.com/download/client.shtml
Related URL CVE-2005-3483 (CVE)
Related URL 15285 (SecurityFocus)
Related URL 22953 (ISS)