Vulnerability Description
grpWise.exe for Novell GroupWise client 5.5 through 6.5.2 stores the password in plaintext in memory, which allows attackers to obtain the password using a debugger or another mechanism to read process memory.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Novell | Groupwise | 6.0 |
References
- http://archives.neohapsis.com/archives/bugtraq/2005-06/0158.html
- http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0858.html
- http://marc.info/?l=bugtraq&m=112431139225724&w=2
- http://securitytracker.com/id?1014247Vendor Advisory
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098073.htmVendor Advisory
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/2972056.htmPatch
- http://www.osvdb.org/17470
- http://www.securiteam.com/windowsntfocus/5UP0Q0UG0I.html
- http://www.securityfocus.com/bid/13997
- https://exchange.xforce.ibmcloud.com/vulnerabilities/21075
- http://archives.neohapsis.com/archives/bugtraq/2005-06/0158.html
- http://archives.neohapsis.com/archives/fulldisclosure/2005-08/0858.html
- http://marc.info/?l=bugtraq&m=112431139225724&w=2
- http://securitytracker.com/id?1014247Vendor Advisory
- http://support.novell.com/cgi-bin/search/searchtid.cgi?/10098073.htmVendor Advisory
FAQ
What is CVE-2005-2620?
CVE-2005-2620 is a vulnerability with a CVSS score of 5.0 (MEDIUM). grpWise.exe for Novell GroupWise client 5.5 through 6.5.2 stores the password in plaintext in memory, which allows attackers to obtain the password using a debugger or another mechanism to read proces...
How severe is CVE-2005-2620?
CVE-2005-2620 has been rated MEDIUM with a CVSS base score of 5.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2005-2620?
Check the references section above for vendor advisories and patch information. Affected products include: Novell Groupwise.