VID |
23149 |
Severity |
40 |
Port |
443,491 |
Protocol |
TCP |
Class |
Daemon |
Detailed Description |
The GO-Global server is vulnerable to a buffer overflow vulnerability which exist in versions 3.1.0.3270 and earlier. GO-Global for Windows makes it easy to publish your Windows applications to your network or the Web. GO-Global for Windows 3.1.0.3270 and earlier could allow a remote attacker to cause a buffer overflow via a data block that is longer than the specified data block size. A remote attacker could exploit this flaw to overflow the buffer, causing the server to crash and possibly even allowing for arbitrary code execution on the affected system.
* References: http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038371.html http://marc.theaimsgroup.com/?l=full-disclosure&m=113095918810489&w=2 http://aluigi.altervista.org/adv/ggwbof-adv.txt http://www.frsirt.com/english/advisories/2005/2290 http://secunia.com/advisories/17424
* Platforms Affected: GraphOn GO-Global version 3.1.0.3270 and earlier versions Microsoft Windows Any version |
Recommendation |
Upgrade to the latest version of GO-Global (3.1.0.3281 or later) available from the following GO-Global Web sites:
GO-Global Host for Windows: http://www.graphon.com/download/host.shtml
GO-Global Client for Windows: http://www.graphon.com/download/client.shtml |
Related URL |
CVE-2005-3483 (CVE) |
Related URL |
15285 (SecurityFocus) |
Related URL |
22953 (ISS) |
|