Novell is now a part of Micro Focus

My Favorites


Please to see your favorites.

Security Vulnerability - GroupWise 8 Windows Client Address Book Remote Code Execution Vulnerability

This document (7010205) is provided subject to the disclaimer at the end of this document.


Novell GroupWise 8
Novell GroupWise 8 Client for Windows
Affected versions: GroupWise 8.0x up to (and including) 8.02HP3


The GroupWise 8 Client for Windows is vulnerable to an exploit where a malformed address book could cause heap memory corruption, which could lead to remote code execution under the privilege of the user that opened the address book.

This vulnerability was discovered and reported by Francis Provencher of Protek Research Lab (

Novell bug 733885, CVE-2011-4189


To resolve this issue, apply GroupWise 8.0 Support Pack 3 (or later) client for Windows.
GroupWise 2012 is not affected by this vulnerability.

Previous versions of GroupWise (such as version 7.x) are likely also vulnerable but are no longer supported. Customers using earlier versions of GroupWise should upgrade their software to at least version 8.03 in order to secure their system.


Security Alert

Bug Number



This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7010205
  • Creation Date:23-FEB-12
  • Modified Date:28-JUN-12
    • NovellGroupWise

Did this document solve your problem? Provide Feedback