First published: Tue Aug 09 2011(Updated: )
The Mobility Pack before 1.2 in Novell Data Synchronizer 1.x through 1.1.2 build 428 allows remote attackers to bypass WebAdmin authentication and obtain sensitive GroupWise information via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Novell Mobility Pack | =1.1 | |
Novell Data Synchronizer | =1.1.2 | |
Novell Data Synchronizer | =1.1.0 | |
Novell Data Synchronizer | =1.1.1 | |
Novell Mobility Pack | =1.1.2 | |
Novell Data Synchronizer | =1.0.0 | |
Novell Mobility Pack | =1.0 | |
Novell Mobility Pack | =1.1.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-2221 is considered to have a high severity due to the potential for unauthorized access to sensitive information.
To mitigate CVE-2011-2221, you should upgrade Novell Data Synchronizer and Mobility Pack to version 1.2 or later.
CVE-2011-2221 affects Novell Mobility Pack versions 1.0, 1.1, and Novell Data Synchronizer versions 1.0.0 through 1.1.2.
CVE-2011-2221 allows remote attackers to bypass WebAdmin authentication, although the specific attack vectors are unspecified.
CVE-2011-2221 allows attackers to access sensitive GroupWise information.