My Favorites


Please to see your favorites.

Security Vulnerability: GroupWise Client for Windows Remote Code Execution Vulnerability

This document (7010771) is provided subject to the disclaimer at the end of this document.


GroupWise 8.0x up to and including 8.02HP3
GroupWise 2012


The GroupWise Client for Windows is vulnerable to an exploit where by enticing a target user to open a malicious file, a remote attacker can leverage the vulnerability to gain remote code execution within the security context of the affected user, or crash the affected application.


To resolve this vulnerability, apply GroupWise 8.0 Support Pack 3 (or later) or GroupWise 2012 Support Pack 1.

Previous versions of GroupWise are likely also vulnerable but are no longer supported. Customers on earlier versions of GroupWise should, at a minimum, upgrade their GroupWise clients to version 8.0 Support Pack 3 or 2012 SP1 in order to secure their system.

This vulnerability was discovered and reported by Pavel Polischouk with Telus Security Labs (http://www.telussecuritylabs.com)

Novell bug 752521, CVE-2012-0418


Security Alert


This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7010771
  • Creation Date:11-SEP-12
  • Modified Date:21-SEP-12
    • NovellGroupWise

Did this document solve your problem? Provide Feedback