Vulnerability Name:

CVE-2010-4711 (CCN-63099)

Assigned:2010-11-09
Published:2010-11-09
Updated:2011-04-26
Summary:Double free vulnerability in the IMAP server component in GroupWise Internet Agent (GWIA) in Novell GroupWise before 8.02HP allows remote attackers to execute arbitrary code via a large parameter in a LIST command.
CVSS v3 Severity:8.6 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.8 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.0 High (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C)
7.0 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:C/E:POC/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Complete
Vulnerability Type:CWE-399
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-4711

Source: CCN
Type: SA40820
Novell GroupWise Multiple Vulnerabilities

Source: CONFIRM
Type: UNKNOWN
http://www.facebook.com/note.php?note_id=477865030928

Source: CCN
Type: Novell Document ID: 7007151
GroupWise 8 Internet Agent IMAP Remote Code Execution Vulnerability

Source: CONFIRM
Type: Vendor Advisory
http://www.novell.com/support/viewContent.do?externalId=7007151&sliceId=1

Source: CCN
Type: OSVDB ID: 69140
Novell GroupWise IMAP LIST Command Large Parameter Double-free Arbitrary Code Execution

Source: CCN
Type: BID-44732
Novell GroupWise Multiple Remote Vulnerabilities

Source: MISC
Type: UNKNOWN
http://zerodayinitiative.com/advisories/ZDI-10-242/

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=647519

Source: XF
Type: UNKNOWN
groupwise-imaplist-code-exec(63099)

Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [11-09-2010]

Source: CCN
Type: ZDI-10-242
Novell Groupwise Internet Agent IMAP LIST Command Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:groupwise:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:4.1a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.5:*:enhancement_pack:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.57e:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp3:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp4:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp6:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:*:*:*:*:*:*:*:* (Version <= 8.0.2)

  • Configuration CCN 1:
  • cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:hp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:hp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.01:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.02:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell groupwise 4.1
    novell groupwise 4.1a
    novell groupwise 5.0
    novell groupwise 5.1
    novell groupwise 5.2
    novell groupwise 5.5
    novell groupwise 5.5
    novell groupwise 5.57e
    novell groupwise 6.0
    novell groupwise 6.0 sp1
    novell groupwise 6.0 sp5
    novell groupwise 6.0.1 sp1
    novell groupwise 6.5
    novell groupwise 6.5 sp1
    novell groupwise 6.5 sp2
    novell groupwise 6.5 sp3
    novell groupwise 6.5 sp4
    novell groupwise 6.5 sp5
    novell groupwise 6.5 sp6
    novell groupwise 6.5.2
    novell groupwise 6.5.3
    novell groupwise 6.5.4
    novell groupwise 6.5.6
    novell groupwise 6.5.7
    novell groupwise 7.0
    novell groupwise 7.0.1
    novell groupwise 7.0.2
    novell groupwise 7.0.3
    novell groupwise 7.0.4
    novell groupwise 8.0
    novell groupwise 8.0.1
    novell groupwise *
    novell groupwise 8.0
    novell groupwise 8.0 hp1
    novell groupwise 8.0 hp2
    novell groupwise 8.0 sp1
    novell groupwise 8.01
    novell groupwise 8.02