Novell Home

My Favorites

Close

Please to see your favorites.

Security Vulnerability - GroupWise 8 Agent HTTP Interfaces Remote Code Execution

This document (7007159) is provided subject to the disclaimer at the end of this document.

Environment

Novell GroupWise 8
Novell GroupWise 8 Message Transfer Agent (MTA)
Novell GroupWise 8 Post Office Agent (POA)
Novell GroupWise 8 Internet Agent (GWIA)
Novell GroupWise WebAccess Agent
Novell GroupWise Monitor Agent
Previous versions of GroupWise are likely also vulnerable but are no longer supported. Customers on earlier versions of GroupWise should, at a minimum, upgrade their GWIAs and associated Domains to version 8.02HP in order to secure their system.

Situation

The HTTP interfaces for the GroupWise agents (Message Transfer Agent, Post Office Agent, Internet Agent, WebAccess Agent, Monitor Agent) are vulnerable to an exploit that could allow a remote attacker to execute arbitrary code on vulnerable installations of Novell Groupwise. Authentication is not required to exploit this vulnerability.


Resolution

Upgrade all GroupWise agents to version 8.02HP (or disable the GroupWise agents' HTTP interfaces) in order to resolve this security issue.

This vulnerability was discovered and reported by Anonymous working with TippingPoint's Zero Day Initiative (http://www.zerodayinitiative.com), ZDI-CAN-770

Novell bug 627942, CVE number pending

Status

Security Alert

Bug Number

627942

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7007159
  • Creation Date:04-NOV-10
  • Modified Date:26-APR-12
    • NovellGroupWise

Did this document solve your problem? Provide Feedback