First published: Tue Aug 14 2001(Updated: )
GroupWise 5.5 and 6 running in live remote or smart caching mode allows remote attackers to read arbitrary users' mailboxes by extracting usernames and passwords from sniffed network traffic, as addressed by the "Padlock" fix.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus GroupWise | =6.0 | |
Micro Focus GroupWise | =5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-1231 is considered to be a moderate severity vulnerability due to the potential for unauthorized access to users' mailboxes.
To mitigate CVE-2001-1231, it is recommended to implement the 'Padlock' fix provided by Novell and ensure secure network practices to protect user credentials.
CVE-2001-1231 affects Novell GroupWise versions 5.5 and 6.0 running in live remote or smart caching mode.
Yes, CVE-2001-1231 allows remote attackers to read arbitrary users' mailboxes by extracting sensitive usernames and passwords from the network traffic.
CVE-2001-1231 is exposed during live remote or smart caching mode, particularly in environments where network traffic is not encrypted.