| Vulnerability Name: | CVE-2011-4189 (CCN-73588) | ||||||||
| Assigned: | 2011-10-25 | ||||||||
| Published: | 2012-03-01 | ||||||||
| Updated: | 2018-01-11 | ||||||||
| Summary: | The client in Novell GroupWise 8.0x through 8.02HP3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via a long e-mail address in an Address Book (aka .NAB) file. | ||||||||
| CVSS v3 Severity: | 7.3 High (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
5.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P/E:POC/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-94 | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2011-4189 Source: OSVDB Type: UNKNOWN 79720 Source: CCN Type: SA48199 Novell GroupWise Client Address Book Processing Buffer Overflow Vulnerability Source: SECUNIA Type: UNKNOWN 48199 Source: CCN Type: Novell Document ID: 7010205 Security VulnerabilityGroupWise 8 Windows Client Address Book Remote Code Execution Vulnerability Source: CONFIRM Type: Vendor Advisory http://www.novell.com/support/viewContent.do?externalId=7010205 Source: CCN Type: OSVDB ID: 79720 Novell GroupWise Client Novell Address Book (.nab) File Handling Email Address Field Remote Overflow Source: CCN Type: PRL 2012-04 Novell Groupwise Address Book Remote Code Execution Source: MISC Type: Exploit http://www.protekresearchlab.com/index.php?option=com_content&view=article&id=37&Itemid=37 Source: BID Type: UNKNOWN 52233 Source: CCN Type: BID-52233 Novell Groupwise Client CVE-2011-4189 Address Book Parsing Remote Code Execution Vulnerability Source: SECTRACK Type: UNKNOWN 1026753 Source: CONFIRM Type: UNKNOWN https://bugzilla.novell.com/show_bug.cgi?id=733885 Source: XF Type: UNKNOWN groupwise-nab-bo(73588) Source: XF Type: UNKNOWN groupwise-nab-bo(73588) Source: EXPLOIT-DB Type: EXPLOIT Offensive Security Exploit Database [03-01-2012] | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| BACK | |||||||||