Check Point Advisories

Preemptive Protection against Novell Groupwise Internet Agent RCPT Command Buffer Overflow

Check Point Reference: CPAI-2009-041
Date Published: 26 Jan 2009
Severity: High
Last Updated: Friday 13 March, 2009
Source: Secunia Advisory: SA33744 
Industry Reference:

CVE-2009-0410

Protection Provided by:
Who is Vulnerable? Novell Groupwise 6.5.x
Novell Groupwise 7.0
Novell Groupwise 7.01
Novell Groupwise 7.02x
Novell Groupwise 7.03
Novell Groupwise 7.03HP1a
Novell Groupwise 8.0
Vulnerability Description A buffer overflow vulnerability was reported in Novell GroupWise, a client-server collaborative software and email system provided by Novell. The vulnerability is due to a boundary error while processing specially crafted SMTP requests. Remote attackers can exploit this vulnerability to execute arbitrary code on the target server.
Update/Patch AvaliableVendor has released a patch:
http://download.novell.com/Download?buildid=GjZRRdqCFW0 
Vulnerability DetailsThe vulnerability is caused due to an off-by-one error when processing SMTP RCPT arguments within the Novell GroupWise Internet Agent (GWIA) SMTP daemon. This can be exploited to crash the vulnerable service or potentially execute arbitrary code via an overly long email address.

Protection Overview

×
  Feedback
This website uses cookies for its functionality and for analytics and marketing purposes. By continuing to use this website, you agree to the use of cookies. For more information, please read our Cookies Notice.
OK