Vulnerability Name:

CVE-2002-1088 (CCN-9671)

Assigned:2002-07-25
Published:2002-07-25
Updated:2008-09-05
Summary:Buffer overflow in Novell GroupWise 6.0.1 Support Pack 1 allows remote attackers to execute arbitrary code via a long RCPT TO command.
CVSS v3 Severity:7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
7.5 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: BUGTRAQ
Type: UNKNOWN
20020725 Novell GroupWise 6.0.1 Support Pack 1 Bufferoverflow

Source: CCN
Type: BugTraq Mailing List, Thu Jul 25 2002 - 05:56:45 CDT
Novell GroupWise 6.0.1 Support Pack 1 Bufferoverflow

Source: MITRE
Type: CNA
CVE-2002-1088

Source: CCN
Type: Novell Support Web site
NOVELL: Product Updates - Beta Patches - GroupWise 6

Source: CONFIRM
Type: UNKNOWN
http://support.novell.com/servlet/tidfinder/2963273

Source: XF
Type: Patch, Vendor Advisory
groupwise-rcpt-bo(9671)

Source: CCN
Type: OSVDB ID: 15441
Novell GroupWise RCPT TO Command Remote Overflow

Source: BID
Type: Patch, Vendor Advisory
5313

Source: CCN
Type: BID-5313
Novell GroupWise Internet Agent Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
groupwise-rcpt-bo(9671)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:groupwise:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell groupwise 6.0
    novell groupwise 6.0 sp1
    novell groupwise 6.0.1 sp1
    novell groupwise 6.0.1 sp1