Vulnerability Name:

CVE-2010-4714 (CCN-63093)

Assigned:2010-11-09
Published:2010-11-09
Updated:2011-04-26
Summary:Multiple stack-based buffer overflows in Novell GroupWise before 8.02HP allow remote attackers to execute arbitrary code via a long HTTP Host header to (1) gwpoa.exe in the Post Office Agent, (2) gwmta.exe in the Message Transfer Agent, (3) gwia.exe in the Internet Agent, (4) the WebAccess Agent, or (5) the Monitor Agent.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
7.4 High (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2010-4714

Source: CCN
Type: SA40820
Novell GroupWise Multiple Vulnerabilities

Source: CONFIRM
Type: UNKNOWN
http://www.facebook.com/note.php?note_id=477865030928

Source: CCN
Type: Novell Document ID: 7007152
GroupWise 8 Internet Agent "Content-Type" Multiple Value Parsing

Source: CONFIRM
Type: Vendor Advisory
http://www.novell.com/support/viewContent.do?externalId=7007159&sliceId=1

Source: CCN
Type: OSVDB ID: 69143
Novell GroupWise Multiple Agent HTTP 301 Response Host Header Overflow

Source: CCN
Type: BID-44732
Novell GroupWise Multiple Remote Vulnerabilities

Source: MISC
Type: UNKNOWN
http://zerodayinitiative.com/advisories/ZDI-10-247/

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.novell.com/show_bug.cgi?id=627942

Source: XF
Type: UNKNOWN
groupwise-gwia-entities-bo(63093)

Source: CCN
Type: ZDI-10-237
Novell GroupWise Internet Agent Content-Type Multiple Value Parsing Remote Code Execution Vulnerability

Vulnerable Configuration:Configuration 1:
  • cpe:/a:novell:groupwise:4.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:4.1a:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.5:*:enhancement_pack:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:5.57e:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp3:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp4:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp5:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5:sp6:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.6:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:6.5.7:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:7.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:*:*:*:*:*:*:*:* (Version <= 8.0.2)

  • Configuration CCN 1:
  • cpe:/a:novell:groupwise:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:hp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:hp2:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.0:sp1:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.01:*:*:*:*:*:*:*
  • OR cpe:/a:novell:groupwise:8.02:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    novell groupwise 4.1
    novell groupwise 4.1a
    novell groupwise 5.0
    novell groupwise 5.1
    novell groupwise 5.2
    novell groupwise 5.5
    novell groupwise 5.5
    novell groupwise 5.57e
    novell groupwise 6.0
    novell groupwise 6.0 sp1
    novell groupwise 6.0 sp5
    novell groupwise 6.0.1 sp1
    novell groupwise 6.5
    novell groupwise 6.5 sp1
    novell groupwise 6.5 sp2
    novell groupwise 6.5 sp3
    novell groupwise 6.5 sp4
    novell groupwise 6.5 sp5
    novell groupwise 6.5 sp6
    novell groupwise 6.5.2
    novell groupwise 6.5.3
    novell groupwise 6.5.4
    novell groupwise 6.5.6
    novell groupwise 6.5.7
    novell groupwise 7.0
    novell groupwise 7.0.1
    novell groupwise 7.0.2
    novell groupwise 7.0.3
    novell groupwise 7.0.4
    novell groupwise 8.0
    novell groupwise 8.0.1
    novell groupwise *
    novell groupwise 8.0
    novell groupwise 8.0 hp1
    novell groupwise 8.0 hp2
    novell groupwise 8.0 sp1
    novell groupwise 8.01
    novell groupwise 8.02