Skip to main content

Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability

Last Update Date: 6 Mar 2012 Release Date: 2 Mar 2012 5306 Views

RISK: Medium Risk

TYPE: Clients - Email Clients

TYPE: Email Clients

A vulnerability has been identified in Novell GroupWise Client, which can be exploited by malicious people to compromise a user's system.

The vulnerability is caused due to an error when processing Novell Address Book (".nab") files and can be exploited to cause a heap-based buffer overflow via an overly long email address.

Successful exploitation may allow execution of arbitrary code, but requires tricking a user into opening a malicious file.


Impact

  • Remote Code Execution

System / Technologies affected

  • Novell GroupWise Client 8.x
  • Novell GroupWise Server 8.x

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

  • Update to version 8.02 post-HP3 FTF.

Vulnerability Identifier


Source

 


Related Link