Novell Home

My Favorites

Close

Please to see your favorites.

Security Vulnerability: GroupWise Client for Windows Remote Code Execution Vulnerability

This document (7010771) is provided subject to the disclaimer at the end of this document.

Environment

GroupWise 8.0x up to and including 8.02HP3
GroupWise 2012

Situation

The GroupWise Client for Windows is vulnerable to an exploit where by enticing a target user to open a malicious file, a remote attacker can leverage the vulnerability to gain remote code execution within the security context of the affected user, or crash the affected application.

Resolution

To resolve this vulnerability, apply GroupWise 8.0 Support Pack 3 (or later) or GroupWise 2012 Support Pack 1.

Previous versions of GroupWise are likely also vulnerable but are no longer supported. Customers on earlier versions of GroupWise should, at a minimum, upgrade their GroupWise clients to version 8.0 Support Pack 3 or 2012 SP1 in order to secure their system.

This vulnerability was discovered and reported by Pavel Polischouk with Telus Security Labs (http://www.telussecuritylabs.com)

Novell bug 752521, CVE-2012-0418

Status

Security Alert

Disclaimer

This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7010771
  • Creation Date:11-SEP-12
  • Modified Date:21-SEP-12
    • NovellGroupWise

Did this document solve your problem? Provide Feedback