Skip to main content

Novell GroupWise Multiple Vulnerabilities

Last Update Date: 28 Jan 2011 Release Date: 25 May 2009 5475 Views

RISK: Medium Risk

Multiple vulnerabilities have been identified in Novell GroupWise, which could be exploited by remote attackers to bypass security restrictions, conduct phishing attacks, cause a denial of service or compromise a vulnerable system.

1. A buffer overflow error in the Novell GroupWise Internet Agent (GWIA) when processing specially crafted email addresses via SMTP, which could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges.

2. A buffer overflow error in the Novell GroupWise Internet Agent (GWIA) when processing certain SMTP requests, which could be exploited by remote unauthenticated attackers to execute arbitrary code with SYSTEM privileges.

3. A input validation errors in the GroupWise WebAccess, which could allow attackers to use Javascript to deface the login page, preventing users from logging in to WebAccess.

4. An error in the way GroupWise WebAccess blocks scripting, which could be exploited by attackers to gain access to an authenticated user's mailbox and forward data or requests to a malicious site.

5. An errors within the session management mechanisms in the GroupWise WebAccess, which could allow an attacker to gain access to an authenticated user's account.

6. A input validation errors in the GroupWise WebAccess within the handling of style expressions, which could be exploited by attackers to redirect a user and/or forward data or requests to a malicious site via a specially crafted message with an HTML file.


System / Technologies affected

  • Novell GroupWise version 7.03 HP2 and prior
  • Novell GroupWise version 8.0.0 HP1 and prior

Solutions

Before installation of the software, please visit the software manufacturer web-site for more details.

Apply Novell GroupWise 7.03 Hot Patch 3 (HP3) and GroupWise 8.0 Hot Patch 2 (HP2) or later.


Vulnerability Identifier


Source