First published: Tue May 26 2009(Updated: )
Multiple buffer overflows in the Internet Agent (aka GWIA) component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 allow remote attackers to execute arbitrary code via (1) a crafted e-mail address in an SMTP session or (2) an SMTP command.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus GroupWise | =8.0-hp1 | |
Micro Focus GroupWise | =7.0 | |
Micro Focus GroupWise | =7.03-hp2 | |
Micro Focus GroupWise | =7.0.2 | |
Micro Focus GroupWise | =7.0-sp1 | |
Micro Focus GroupWise | =7.0-sp3 | |
Micro Focus GroupWise | =7.01 | |
Micro Focus GroupWise | =7.0.0-sp1 | |
Micro Focus GroupWise | =7.0.3 | |
Micro Focus GroupWise | =7.03-hp1a | |
Micro Focus GroupWise | =7.0-sp2 | |
Micro Focus GroupWise | =7.0.0-sp2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2009-1636 is classified with a high severity due to the potential for remote code execution.
To fix CVE-2009-1636, upgrade Novell GroupWise to version 7.03 HP3 or 8.0 HP2 or later.
CVE-2009-1636 affects users of Novell GroupWise versions 7.x before 7.03 HP3 and 8.x before 8.0 HP2.
CVE-2009-1636 allows remote attackers to execute arbitrary code via crafted e-mail addresses or SMTP commands.
There are no known effective workarounds for CVE-2009-1636, thus an upgrade is recommended.