Vulnerability Name:
CVE-2010-4711 (CCN-63099)
Assigned:
2010-11-09
Published:
2010-11-09
Updated:
2011-04-26
Summary:
Double free vulnerability in the IMAP server component in GroupWise Internet Agent (GWIA) in Novell GroupWise before 8.02HP allows remote attackers to execute arbitrary code via a large parameter in a LIST command.
CVSS v3 Severity:
8.6 High
(CCN CVSS v3.1 Vector:
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:H
)
Exploitability Metrics:
Attack Vector (AV):
Network
Attack Complexity (AC):
Low
Privileges Required (PR):
None
User Interaction (UI):
None
Scope:
Scope (S):
Unchanged
Impact Metrics:
Confidentiality (C):
Low
Integrity (I):
Low
Availibility (A):
High
CVSS v2 Severity:
10.0 High
(CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C
)
7.8 High
(Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:C/I:C/A:C/E:POC/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Authentication (Au):
None
Impact Metrics:
Confidentiality (C):
Complete
Integrity (I):
Complete
Availibility (A):
Complete
9.0 High
(CCN CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:C
)
7.0 High
(CCN Temporal CVSS v2 Vector:
AV:N/AC:L/Au:N/C:P/I:P/A:C/E:POC/RL:OF/RC:C
)
Exploitability Metrics:
Access Vector (AV):
Network
Access Complexity (AC):
Low
Athentication (Au):
None
Impact Metrics:
Confidentiality (C):
Partial
Integrity (I):
Partial
Availibility (A):
Complete
Vulnerability Type:
CWE-399
Vulnerability Consequences:
Gain Access
References:
Source: MITRE
Type: CNA
CVE-2010-4711
Source: CCN
Type: SA40820
Novell GroupWise Multiple Vulnerabilities
Source: CONFIRM
Type: UNKNOWN
http://www.facebook.com/note.php?note_id=477865030928
Source: CCN
Type: Novell Document ID: 7007151
GroupWise 8 Internet Agent IMAP Remote Code Execution Vulnerability
Source: CONFIRM
Type: Vendor Advisory
http://www.novell.com/support/viewContent.do?externalId=7007151&sliceId=1
Source: CCN
Type: OSVDB ID: 69140
Novell GroupWise IMAP LIST Command Large Parameter Double-free Arbitrary Code Execution
Source: CCN
Type: BID-44732
Novell GroupWise Multiple Remote Vulnerabilities
Source: MISC
Type: UNKNOWN
http://zerodayinitiative.com/advisories/ZDI-10-242/
Source: CONFIRM
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=647519
Source: XF
Type: UNKNOWN
groupwise-imaplist-code-exec(63099)
Source: EXPLOIT-DB
Type: EXPLOIT
Offensive Security Exploit Database [11-09-2010]
Source: CCN
Type: ZDI-10-242
Novell Groupwise Internet Agent IMAP LIST Command Remote Code Execution Vulnerability
Vulnerable Configuration:
Configuration 1
:
cpe:/a:novell:groupwise:4.1:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:4.1a:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.0:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.1:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.2:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.5:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.5:*:enhancement_pack:*:*:*:*:*
OR
cpe:/a:novell:groupwise:5.57e:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.0:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.0:sp1:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.0:sp5:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp1:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp2:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp3:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp4:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp5:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5:sp6:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5.2:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5.3:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5.4:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5.6:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:6.5.7:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:7.0:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:7.0.1:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:7.0.2:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:7.0.3:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:7.0.4:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.0.1:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:*:*:*:*:*:*:*:*
(Version <= 8.0.2)
Configuration CCN 1
:
cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.0:hp1:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.0:hp2:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.0:sp1:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.01:*:*:*:*:*:*:*
OR
cpe:/a:novell:groupwise:8.02:*:*:*:*:*:*:*
Denotes that component is vulnerable
BACK
novell
groupwise 4.1
novell
groupwise 4.1a
novell
groupwise 5.0
novell
groupwise 5.1
novell
groupwise 5.2
novell
groupwise 5.5
novell
groupwise 5.5
novell
groupwise 5.57e
novell
groupwise 6.0
novell
groupwise 6.0 sp1
novell
groupwise 6.0 sp5
novell
groupwise 6.0.1 sp1
novell
groupwise 6.5
novell
groupwise 6.5 sp1
novell
groupwise 6.5 sp2
novell
groupwise 6.5 sp3
novell
groupwise 6.5 sp4
novell
groupwise 6.5 sp5
novell
groupwise 6.5 sp6
novell
groupwise 6.5.2
novell
groupwise 6.5.3
novell
groupwise 6.5.4
novell
groupwise 6.5.6
novell
groupwise 6.5.7
novell
groupwise 7.0
novell
groupwise 7.0.1
novell
groupwise 7.0.2
novell
groupwise 7.0.3
novell
groupwise 7.0.4
novell
groupwise 8.0
novell
groupwise 8.0.1
novell
groupwise *
novell
groupwise 8.0
novell
groupwise 8.0 hp1
novell
groupwise 8.0 hp2
novell
groupwise 8.0 sp1
novell
groupwise 8.01
novell
groupwise 8.02