Vulnerability Name:
CVE-2010-4325 (CCN-64928)
Assigned:
2010-11-29
Published:
2011-01-25
Updated:
2018-10-10
Summary:
Buffer overflow in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise before 8.02HP2 allows remote attackers to execute arbitrary code via a crafted TZID variable in a VCALENDAR message.
CVSS v3 Severity:
10.0 Critical
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Changed
Impact Metrics:
Confidentiality (C):
High
Integrity (I):
High
Availibility (A):
High
CVSS v2 Severity:
10.0 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
)
7.4 High
(Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
10.0 High
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
)
7.4 High
(CCN Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
Vulnerability Type:
CWE-119
Vulnerability Consequences:
Gain Access
References:
Source: MITRE
Type: CNA
CVE-2010-4325
Source: OSVDB
Type: UNKNOWN
70676
Source: CCN
Type: SA43089
Novell GroupWise Internet Agent VCALENDAR Message Buffer Overflow Vulnerability
Source: SECUNIA
Type: UNKNOWN
43089
Source: CCN
Type: SA43513
Novell GroupWise Multiple Vulnerabilities
Source: CCN
Type: Novell Document ID: 7007638
Security Vulnerability - GroupWise 8 Internet Agent TZID (VCALENDAR) Variable Parsing
Source: CONFIRM
Type: Vendor Advisory
http://www.novell.com/support/viewContent.do?externalId=7007638&sliceId=1
Source: CONFIRM
Type: UNKNOWN
http://www.novell.com/support/viewContent.do?externalId=7009212
Source: CCN
Type: OSVDB ID: 70676
Novell GroupWise Internet Agent Email Message VCALENDAR Data TZID Variable Remote Overflow
Source: BUGTRAQ
Type: UNKNOWN
20110126 VUPEN Security Research - Novell GroupWise "TZID" Variable Remote Buffer Overflow Vulnerability (VUPEN-SR-2011-004)
Source: BID
Type: UNKNOWN
46025
Source: CCN
Type: BID-46025
Novell GroupWise Internet Agent 'TZID' Variable Parsing Buffer Overflow Vulnerability
Source: VUPEN
Type: Vendor Advisory
ADV-2011-0220
Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-11-027/
Source: CONFIRM
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=657818
Source: CONFIRM
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=685304
Source: XF
Type: UNKNOWN
groupwise-tzid-bo(64928)
Source: XF
Type: UNKNOWN
groupwise-tzid-bo(64928)
Source: IDEFENSE
Type: UNKNOWN
20110926 Novell GroupWise iCal RRULE Weekday Recurrence Heap Overflow Vulnerability
Source: CCN
Type: ZDI-11-027
Novell GroupWise Internet Agent TZID Parsing Remote Code Execution Vulnerability
Source: CCN
Type: ZDI-11-285
Novell Groupwise iCal COMMENT, RRULE, TZNAME Remote Code Execution Vulnerabilities
Vulnerable Configuration:
Configuration 1
:
cpe:/a:novell:groupwise:4.1:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:4.1a:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.0:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.1:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.2:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.5:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.5:*:enhancement_pack:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.57e:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.0:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.0:sp1:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.0:sp5:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp1:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp2:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp3:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp4:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp5:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp6:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5.2:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5.3:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5.4:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5.6:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5.7:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:7.0:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:7.0.1:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:7.0.2:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:7.0.3:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:7.0.4:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.0.1:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:*:hp1:*:*:*:*:*:*
(Version <= 8.0.2)
Configuration CCN 1
:
cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.0:hp1:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.0:hp2:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.0:sp1:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.01:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.02:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
novell
groupwise 4.1
novell
groupwise 4.1a
novell
groupwise 5.0
novell
groupwise 5.1
novell
groupwise 5.2
novell
groupwise 5.5
novell
groupwise 5.5
novell
groupwise 5.57e
novell
groupwise 6.0
novell
groupwise 6.0 sp1
novell
groupwise 6.0 sp5
novell
groupwise 6.0.1 sp1
novell
groupwise 6.5
novell
groupwise 6.5 sp1
novell
groupwise 6.5 sp2
novell
groupwise 6.5 sp3
novell
groupwise 6.5 sp4
novell
groupwise 6.5 sp5
novell
groupwise 6.5 sp6
novell
groupwise 6.5.2
novell
groupwise 6.5.3
novell
groupwise 6.5.4
novell
groupwise 6.5.6
novell
groupwise 6.5.7
novell
groupwise 7.0
novell
groupwise 7.0.1
novell
groupwise 7.0.2
novell
groupwise 7.0.3
novell
groupwise 7.0.4
novell
groupwise 8.0
novell
groupwise 8.0.1
novell
groupwise * hp1
novell
groupwise 8.0
novell
groupwise 8.0 hp1
novell
groupwise 8.0 hp2
novell
groupwise 8.0 sp1
novell
groupwise 8.01
novell
groupwise 8.02