First published: Fri Mar 02 2012(Updated: )
The client in Novell GroupWise 8.0x through 8.02HP3 allows remote attackers to execute arbitrary code or cause a denial of service (heap memory corruption and application crash) via a long e-mail address in an Address Book (aka .NAB) file.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus GroupWise | =8.0 | |
Micro Focus GroupWise | =8.0-hp1 | |
Micro Focus GroupWise | =8.0-hp2 | |
Micro Focus GroupWise | =8.0-sp1 | |
Micro Focus GroupWise | =8.0.1 | |
Micro Focus GroupWise | =8.0.2 | |
Micro Focus GroupWise | =8.0.2-hp1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-4189 has a high severity rating due to its potential for remote code execution and denial of service.
To fix CVE-2011-4189, update your Novell GroupWise client to the latest version provided by Novell.
CVE-2011-4189 affects Novell GroupWise versions 8.0, 8.0.1, 8.0.2, 8.0-hp1, 8.0-hp2, and 8.0-sp1.
CVE-2011-4189 is a vulnerability that allows remote attackers to execute arbitrary code or cause a denial of service through malformed email addresses.
Yes, CVE-2011-4189 can potentially lead to data breaches due to unauthorized code execution by attackers.