Novell GroupWise Internet Agent Content-Type String Parsing: Remote Code Execution Vulnerability

Users of Novell GroupWise Internet Agent Content-Type String Parsing please be advised of a Remote Code Execution vulnerability that has been identified.
To view this vulnerability, possible remedies, and others please check out the Security Advisories at Critical Watch (http://criticalwatch.com/support/security-advisories.aspx)

ZDI-10-238: [ZDI-10-238] Novell GroupWise Internet Agent Content-Type String Parsing Remote Code Execution Vulne

— Affected Products:
Novell Groupwise
— Vulnerability Details:
This vulnerability allows remote attackers to execute arbitrary code on
vulnerable installations of Novell GroupWise. Authentication is not
required to exploit this vulnerability.

The specific flaw exists within the gwia.exe module responsible for
parsing e-mail messages received by the server. When the code encounters
a Content-Type header it proceeds to parse out string data from within
it. The process does not properly check the length of these values
before copying them to a fixed-length buffer. This can be abused by a
remote attacker to execute arbitrary code under the context of the
SYSTEM user.Read more at http://www.criticalwatch.com

 

Advertisements