Vulnerability Name:

CVE-2010-4712 (CCN-63094)

Assigned:2010-11-09
Published:2010-11-09
Updated:2011-04-26
Summary:Multiple stack-based buffer overflows in gwia.exe in GroupWise Internet Agent (GWIA) in Novell GroupWise before 8.02HP allow remote attackers to execute arbitrary code via a Content-Type header containing (1) multiple items separated by ; (semicolon) characters or (2) crafted string data.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-4712

Source: CCN
Type: SA40820
Novell GroupWise Multiple Vulnerabilities

Source: CONFIRM
Type: UNKNOWN
http://www.facebook.com/note.php?note_id=477865030928

Source: CONFIRM
Type: Vendor Advisory
http://www.novell.com/support/viewContent.do?externalId=7007152&sliceId=1

Source: CCN
Type: Novell Document ID: 7007153
GroupWise 8 Internet Agent "Content-Type" String Data Parsing

Source: CONFIRM
Type: Vendor Advisory
http://www.novell.com/support/viewContent.do?externalId=7007153&sliceId=1

Source: CCN
Type: OSVDB ID: 69139
Novell GroupWise gwia.exe Email Message Content-Type Header Multiple Overflow

Source: CCN
Type: BID-44732
Novell GroupWise Multiple Remote Vulnerabilities

Source: MISC
Type: UNKNOWN
http://zerodayinitiative.com/advisories/ZDI-10-237/

Source: MISC
Type: UNKNOWN
http://zerodayinitiative.com/advisories/ZDI-10-238/

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=642336

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=647757

Source: XF
Type: UNKNOWN
groupwise-string-data-bo(63094)

Source: CCN
Type: ZDI-10-238
Novell GroupWise Internet Agent Content-Type String Parsing Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:groupwise:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:4.1a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.5:*:enhancement_pack:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.57e:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp3:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp4:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp6:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:*:*:*:*:*:*:*:* (Version <= 8.0.2)

  • Configuration CCN 1:
  • cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:hp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:hp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.01:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.02:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell groupwise 4.1
    novell groupwise 4.1a
    novell groupwise 5.0
    novell groupwise 5.1
    novell groupwise 5.2
    novell groupwise 5.5
    novell groupwise 5.5
    novell groupwise 5.57e
    novell groupwise 6.0
    novell groupwise 6.0 sp1
    novell groupwise 6.0 sp5
    novell groupwise 6.0.1 sp1
    novell groupwise 6.5
    novell groupwise 6.5 sp1
    novell groupwise 6.5 sp2
    novell groupwise 6.5 sp3
    novell groupwise 6.5 sp4
    novell groupwise 6.5 sp5
    novell groupwise 6.5 sp6
    novell groupwise 6.5.2
    novell groupwise 6.5.3
    novell groupwise 6.5.4
    novell groupwise 6.5.6
    novell groupwise 6.5.7
    novell groupwise 7.0
    novell groupwise 7.0.1
    novell groupwise 7.0.2
    novell groupwise 7.0.3
    novell groupwise 7.0.4
    novell groupwise 8.0
    novell groupwise 8.0.1
    novell groupwise *
    novell groupwise 8.0
    novell groupwise 8.0 hp1
    novell groupwise 8.0 hp2
    novell groupwise 8.0 sp1
    novell groupwise 8.01
    novell groupwise 8.02