Check Point Reference: | CPAI-2009-097 |
Date Published: | 17 Sep 2009 |
Severity: | Critical |
Last Updated: | Tuesday 29 November, 2011 |
Source: | |
Industry Reference: | CVE-2009-1636 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | Novell GroupWise is a client-server collaborative software and email system provided by Novell. A buffer overflow vulnerability has been reported in Novell GroupWise Internet Agent (GWIA) software.The vulnerability is due to an error while processing specially crafted SMTP requests.Specifically, the vulnerability is due to a boundary error while parsing the MAIL FROM command. Remote unauthenticated attackers could exploit this vulnerability by sending a crafted MAIL FROM command to the target server. Successful exploitation could allow for remote code execution. |
This protection will detect and block malformed E-mail addresses.
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: SMTP Protection Violation.
Attack Information: Novell GroupWise email address processing buffer overflow