First published: Mon Jan 17 2005(Updated: )
** DISPUTED ** NOTE: this issue has been disputed by the vendor. The error module in Novell GroupWise WebAccess allows remote attackers who have not authenticated to read potentially sensitive information, such as the version, via an incorrect login and a modified (1) error or (2) modify parameter that returns template files or the "about" information page. NOTE: the vendor has disputed this issue.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus GroupWise | =6.0 | |
Micro Focus GroupWise | =6.0-sp1 | |
Micro Focus GroupWise | =6.0-sp2 | |
Micro Focus GroupWise | =6.0-sp3 | |
Micro Focus GroupWise | =6.0-sp4 | |
Micro Focus GroupWise | =6.5 | |
Micro Focus GroupWise | =6.5-sp1 | |
Micro Focus GroupWise | =6.5-sp2 | |
Novell GroupWise WebAccess | =6.0-sp4 | |
Novell GroupWise WebAccess | =6.5 | |
Novell GroupWise WebAccess | =6.5-sp1 | |
Novell GroupWise WebAccess | =6.5-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2005-0296 is considered to be high due to the potential for unauthorized information disclosure.
To address CVE-2005-0296, it is recommended to upgrade to a patched version of Novell GroupWise or implement access controls to limit unauthenticated access.
CVE-2005-0296 specifically affects Novell GroupWise 6.0 and 6.5, particularly versions with certain service packs.
CVE-2005-0296 allows attackers to potentially read sensitive information such as the version of the application.
A possible workaround for CVE-2005-0296 includes modifying error handling and restricting access to the error module.