Vulnerability Name:

CVE-2010-4325 (CCN-64928)

Assigned:2010-11-29
Published:2011-01-25
Updated:2018-10-10
Summary:Buffer overflow in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise before 8.02HP2 allows remote attackers to execute arbitrary code via a crafted TZID variable in a VCALENDAR message.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
10.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-4325

Source: OSVDB
Type: UNKNOWN
70676

Source: CCN
Type: SA43089
Novell GroupWise Internet Agent VCALENDAR Message Buffer Overflow Vulnerability

Source: SECUNIA
Type: UNKNOWN
43089

Source: CCN
Type: SA43513
Novell GroupWise Multiple Vulnerabilities

Source: CCN
Type: Novell Document ID: 7007638
Security Vulnerability - GroupWise 8 Internet Agent TZID (VCALENDAR) Variable Parsing

Source: CONFIRM
Type: Vendor Advisory
http://www.novell.com/support/viewContent.do?externalId=7007638&sliceId=1

Source: CONFIRM
Type: UNKNOWN
http://www.novell.com/support/viewContent.do?externalId=7009212

Source: CCN
Type: OSVDB ID: 70676
Novell GroupWise Internet Agent Email Message VCALENDAR Data TZID Variable Remote Overflow

Source: BUGTRAQ
Type: UNKNOWN
20110126 VUPEN Security Research - Novell GroupWise "TZID" Variable Remote Buffer Overflow Vulnerability (VUPEN-SR-2011-004)

Source: BID
Type: UNKNOWN
46025

Source: CCN
Type: BID-46025
Novell GroupWise Internet Agent 'TZID' Variable Parsing Buffer Overflow Vulnerability

Source: VUPEN
Type: Vendor Advisory
ADV-2011-0220

Source: MISC
Type: UNKNOWN
http://www.zerodayinitiative.com/advisories/ZDI-11-027/

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=657818

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=685304

Source: XF
Type: UNKNOWN
groupwise-tzid-bo(64928)

Source: XF
Type: UNKNOWN
groupwise-tzid-bo(64928)

Source: IDEFENSE
Type: UNKNOWN
20110926 Novell GroupWise iCal RRULE Weekday Recurrence Heap Overflow Vulnerability

Source: CCN
Type: ZDI-11-027
Novell GroupWise Internet Agent TZID Parsing Remote Code Execution Vulnerability

Source: CCN
Type: ZDI-11-285
Novell Groupwise iCal COMMENT, RRULE, TZNAME Remote Code Execution Vulnerabilities

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:groupwise:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:4.1a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.5:*:enhancement_pack:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.57e:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp3:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp4:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp6:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:*:hp1:*:*:*:*:*:* (Version <= 8.0.2)

  • Configuration CCN 1:
  • cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:hp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:hp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.01:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.02:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell groupwise 4.1
    novell groupwise 4.1a
    novell groupwise 5.0
    novell groupwise 5.1
    novell groupwise 5.2
    novell groupwise 5.5
    novell groupwise 5.5
    novell groupwise 5.57e
    novell groupwise 6.0
    novell groupwise 6.0 sp1
    novell groupwise 6.0 sp5
    novell groupwise 6.0.1 sp1
    novell groupwise 6.5
    novell groupwise 6.5 sp1
    novell groupwise 6.5 sp2
    novell groupwise 6.5 sp3
    novell groupwise 6.5 sp4
    novell groupwise 6.5 sp5
    novell groupwise 6.5 sp6
    novell groupwise 6.5.2
    novell groupwise 6.5.3
    novell groupwise 6.5.4
    novell groupwise 6.5.6
    novell groupwise 6.5.7
    novell groupwise 7.0
    novell groupwise 7.0.1
    novell groupwise 7.0.2
    novell groupwise 7.0.3
    novell groupwise 7.0.4
    novell groupwise 8.0
    novell groupwise 8.0.1
    novell groupwise * hp1
    novell groupwise 8.0
    novell groupwise 8.0 hp1
    novell groupwise 8.0 hp2
    novell groupwise 8.0 sp1
    novell groupwise 8.01
    novell groupwise 8.02