Novell is now a part of Micro Focus

My Favorites


Please to see your favorites.

Heap buffer overflow in GroupWise Post Office Agent

This document (7017975) is provided subject to the disclaimer at the end of this document.


Novell GroupWise 2014 R2
Novell GroupWise 2014
Previous versions of GroupWise are potentially also vulnerable but are no longer supported. Customers on earlier versions of GroupWise should, at a minimum, upgrade their GroupWise servers to version 2014 R2 SP1 HP1 in order to secure their system.


A vulnerability exists in the GroupWise Post Office Agent that may allow a remote unauthenticated attacker to write past the end of a heap buffer with up to 64K of attacker controlled data via an undisclosed vector involving an integer overflow. This is likely to affect the availability of the post office agent and could possibly be used to achieve remote code execution if other protection mechanisms are bypassed.


To resolve this vulnerability, update GroupWise to 2014 R2 SP1 HP1 (or later).
This vulnerability was discovered and reported by Wolfgang Ettlinger working with SEC Consult
Novell bug 987683, CVE-2016-5762


Security Alert

Bug Number



This Support Knowledgebase provides a valuable tool for NetIQ/Novell/SUSE customers and parties interested in our products and solutions to acquire information, ideas and learn from one another. Materials are provided for informational, personal or non-commercial use within your organization and are presented "AS IS" WITHOUT WARRANTY OF ANY KIND.

  • Document ID:7017975
  • Creation Date:23-AUG-16
  • Modified Date:24-AUG-16
    • NovellGroupWise

Did this document solve your problem? Provide Feedback