Unrated severityNVD Advisory· Published Apr 14, 2006· Updated Apr 16, 2026
CVE-2006-0992
CVE-2006-0992
Description
Stack-based buffer overflow in Novell GroupWise Messenger before 2.0 Public Beta 2 allows remote attackers to execute arbitrary code via a long Accept-Language value without a comma or semicolon. NOTE: due to a typo, the original ZDI advisory accidentally referenced CVE-2006-0092. This is the correct identifier.
Affected products
1- cpe:2.3:a:novell:groupwise_messenger:2.0:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
12- support.novell.com/cgi-bin/search/searchtid.cginvdPatch
- www.securityfocus.com/bid/17503nvdPatch
- www.zerodayinitiative.com/advisories/ZDI-06-008.htmlnvdPatchVendor Advisory
- cirt.dk/advisories/cirt-42-advisory.txtnvd
- metasploit.blogspot.com/2006/04/exploit-development-groupwise_14.htmlnvd
- secunia.com/advisories/19663nvd
- securitytracker.com/idnvd
- www.osvdb.org/24617nvd
- www.securityfocus.com/archive/1/430911/100/0/threadednvd
- www.vupen.com/english/advisories/2006/1355nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/25828nvd
- www.exploit-db.com/exploits/1679nvd
News mentions
0No linked articles in our index yet.