CVE-2009-1636

Multiple buffer overflows in the Internet Agent (aka GWIA) component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 allow remote attackers to execute arbitrary code via (1) a crafted e-mail address in an SMTP session or (2) an SMTP command.
References
Link Resource
http://osvdb.org/54644
http://osvdb.org/54645
http://secunia.com/advisories/35177 Vendor Advisory
http://www.novell.com/support/viewContent.do?externalId=7003272&sliceId=1
http://www.novell.com/support/viewContent.do?externalId=7003273&sliceId=1 Vendor Advisory
http://www.securityfocus.com/archive/1/503724/100/0/threaded
http://www.securityfocus.com/bid/35064
http://www.securityfocus.com/bid/35065
http://www.securitytracker.com/id?1022276
http://www.vupen.com/english/advisories/2009/1393 Vendor Advisory
http://www.vupen.com/exploits/Novell_GroupWise_GWIA_Email_Address_Remote_Buffer_Overflow_Exploit_1393141.php Vendor Advisory
http://www.vupen.com/exploits/Novell_GroupWise_GWIA_SMTP_Command_Remote_Buffer_Overflow_PoC_Exploit_1393140.php Vendor Advisory
https://bugzilla.novell.com/show_bug.cgi?id=478892
https://bugzilla.novell.com/show_bug.cgi?id=482914
https://exchange.xforce.ibmcloud.com/vulnerabilities/50692
https://exchange.xforce.ibmcloud.com/vulnerabilities/50693
http://osvdb.org/54644
http://osvdb.org/54645
http://secunia.com/advisories/35177 Vendor Advisory
http://www.novell.com/support/viewContent.do?externalId=7003272&sliceId=1
http://www.novell.com/support/viewContent.do?externalId=7003273&sliceId=1 Vendor Advisory
http://www.securityfocus.com/archive/1/503724/100/0/threaded
http://www.securityfocus.com/bid/35064
http://www.securityfocus.com/bid/35065
http://www.securitytracker.com/id?1022276
http://www.vupen.com/english/advisories/2009/1393 Vendor Advisory
http://www.vupen.com/exploits/Novell_GroupWise_GWIA_Email_Address_Remote_Buffer_Overflow_Exploit_1393141.php Vendor Advisory
http://www.vupen.com/exploits/Novell_GroupWise_GWIA_SMTP_Command_Remote_Buffer_Overflow_PoC_Exploit_1393140.php Vendor Advisory
https://bugzilla.novell.com/show_bug.cgi?id=478892
https://bugzilla.novell.com/show_bug.cgi?id=482914
https://exchange.xforce.ibmcloud.com/vulnerabilities/50692
https://exchange.xforce.ibmcloud.com/vulnerabilities/50693
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:novell:groupwise:7.0:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.0:sp1:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.0:sp2:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.0:sp3:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.0.0:sp1:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.0.0:sp2:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.01:*:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.03:hp1a:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:7.03:hp2:*:*:*:*:*:*
cpe:2.3:a:novell:groupwise:8.0:hp1:*:*:*:*:*:*

History

21 Nov 2024, 01:02

Type Values Removed Values Added
References () http://osvdb.org/54644 - () http://osvdb.org/54644 -
References () http://osvdb.org/54645 - () http://osvdb.org/54645 -
References () http://secunia.com/advisories/35177 - Vendor Advisory () http://secunia.com/advisories/35177 - Vendor Advisory
References () http://www.novell.com/support/viewContent.do?externalId=7003272&sliceId=1 - () http://www.novell.com/support/viewContent.do?externalId=7003272&sliceId=1 -
References () http://www.novell.com/support/viewContent.do?externalId=7003273&sliceId=1 - Vendor Advisory () http://www.novell.com/support/viewContent.do?externalId=7003273&sliceId=1 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/503724/100/0/threaded - () http://www.securityfocus.com/archive/1/503724/100/0/threaded -
References () http://www.securityfocus.com/bid/35064 - () http://www.securityfocus.com/bid/35064 -
References () http://www.securityfocus.com/bid/35065 - () http://www.securityfocus.com/bid/35065 -
References () http://www.securitytracker.com/id?1022276 - () http://www.securitytracker.com/id?1022276 -
References () http://www.vupen.com/english/advisories/2009/1393 - Vendor Advisory () http://www.vupen.com/english/advisories/2009/1393 - Vendor Advisory
References () http://www.vupen.com/exploits/Novell_GroupWise_GWIA_Email_Address_Remote_Buffer_Overflow_Exploit_1393141.php - Vendor Advisory () http://www.vupen.com/exploits/Novell_GroupWise_GWIA_Email_Address_Remote_Buffer_Overflow_Exploit_1393141.php - Vendor Advisory
References () http://www.vupen.com/exploits/Novell_GroupWise_GWIA_SMTP_Command_Remote_Buffer_Overflow_PoC_Exploit_1393140.php - Vendor Advisory () http://www.vupen.com/exploits/Novell_GroupWise_GWIA_SMTP_Command_Remote_Buffer_Overflow_PoC_Exploit_1393140.php - Vendor Advisory
References () https://bugzilla.novell.com/show_bug.cgi?id=478892 - () https://bugzilla.novell.com/show_bug.cgi?id=478892 -
References () https://bugzilla.novell.com/show_bug.cgi?id=482914 - () https://bugzilla.novell.com/show_bug.cgi?id=482914 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/50692 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/50692 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/50693 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/50693 -

Information

Published : 2009-05-26 15:30

Updated : 2024-11-21 01:02


NVD link : CVE-2009-1636

Mitre link : CVE-2009-1636

CVE.ORG link : CVE-2009-1636


JSON object : View

Products Affected

novell

  • groupwise
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer