|
Family: Gain root remotely --> Category: infos
GO-Global Buffer Overflow Vulnerability (registry check) Vulnerability Scan
Vulnerability Scan Summary Checks for buffer overflow vulnerability in GO-Global
Detailed Explanation for this Vulnerability Test
Synopsis :
The remote display client or server is affected by a buffer overflow
vulnerability.
Description :
According to the Windows registry, the remote host is running a
version of the GO-Global remote display client or server that fills a
small buffer with user-supplied data without first checking its size.
A possible hacker can leverage this issue to overflow the buffer, causing
the server to crash and possibly even allowing for arbitrary code
execution on the remote host.
See also :
http://lists.grok.org.uk/pipermail/full-disclosure/2005-November/038371.html
Solution :
Upgrade to GO-Global version 3.1.0.3281 or later.
Threat Level:
Critical / CVSS Base Score : 10
(AV:R/AC:L/Au:NR/C:C/A:C/I:C/B:N)
Click HERE for more information and discussions on this network vulnerability scan.
|