Heap buffer overflow in GroupWise Post Office Agent

  • 7017975
  • 23-Aug-2016
  • 24-Aug-2016

Environment

Novell GroupWise 2014 R2
Novell GroupWise 2014
Previous versions of GroupWise are potentially also vulnerable but are no longer supported. Customers on earlier versions of GroupWise should, at a minimum, upgrade their GroupWise servers to version 2014 R2 SP1 HP1 in order to secure their system.

Situation

A vulnerability exists in the GroupWise Post Office Agent that may allow a remote unauthenticated attacker to write past the end of a heap buffer with up to 64K of attacker controlled data via an undisclosed vector involving an integer overflow. This is likely to affect the availability of the post office agent and could possibly be used to achieve remote code execution if other protection mechanisms are bypassed.

Resolution

To resolve this vulnerability, update GroupWise to 2014 R2 SP1 HP1 (or later).
 
This vulnerability was discovered and reported by Wolfgang Ettlinger working with SEC Consult
 
Novell bug 987683, CVE-2016-5762

Status

Security Alert

Bug Number

987683

Feedback service temporarily unavailable. For content questions or problems, please contact Support.