First published: Wed Sep 19 2012(Updated: )
Integer overflow in the WebConsole component in gwia.exe in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before 8.0.3 HP1 and 2012 before SP1 might allow remote attackers to execute arbitrary code via a crafted request that triggers a heap-based buffer overflow, as demonstrated by a request with -1 in the Content-Length HTTP header.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Micro Focus GroupWise | =8.0 | |
Micro Focus GroupWise | =8.01 | |
Micro Focus GroupWise | =8.01-hp | |
Micro Focus GroupWise | =8.02 | |
Micro Focus GroupWise | =8.02-hp1 | |
Micro Focus GroupWise | =8.02-hp2 | |
Micro Focus GroupWise | =8.02-hp3 | |
Micro Focus GroupWise | =8.03 | |
Micro Focus GroupWise | =2012 | |
Micro Focus GroupWise | =5.2 | |
Micro Focus GroupWise | =5.5 | |
Micro Focus GroupWise | =5.57e | |
Micro Focus GroupWise | =6.0 | |
Micro Focus GroupWise | =6.0.1-sp1 | |
Micro Focus GroupWise | =6.5 | |
Micro Focus GroupWise | =6.5-sp1 | |
Micro Focus GroupWise | =6.5-sp2 | |
Micro Focus GroupWise | =6.5-sp3 | |
Micro Focus GroupWise | =6.5-sp4 | |
Micro Focus GroupWise | =6.5-sp5 | |
Micro Focus GroupWise | =6.5-sp6 | |
Micro Focus GroupWise | =6.5.2 | |
Micro Focus GroupWise | =6.5.3 | |
Micro Focus GroupWise | =6.5.4 | |
Micro Focus GroupWise | =6.5.6 | |
Micro Focus GroupWise | =6.5.7 | |
Micro Focus GroupWise | =7.0 | |
Micro Focus GroupWise | =7.0.3-hp4 | |
Micro Focus GroupWise | =7.0.3-hp5 | |
Micro Focus GroupWise | =7.0.4 | |
Micro Focus GroupWise | =7.0.4-ftf | |
Micro Focus GroupWise | =7.01 | |
Micro Focus GroupWise | =7.01-ir1 | |
Micro Focus GroupWise | =7.02 | |
Micro Focus GroupWise | =7.02-hp1 | |
Micro Focus GroupWise | =7.02-hp1a | |
Micro Focus GroupWise | =7.02-hp2 | |
Micro Focus GroupWise | =7.02-hp2r1 | |
Micro Focus GroupWise | =7.03 | |
Micro Focus GroupWise | =7.03-hp | |
Micro Focus GroupWise | =7.03-hp2 | |
Micro Focus GroupWise | =7.03-hp3 | |
Micro Focus GroupWise | =7.03-hp3\+ftf |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2012-0271 has a high severity rating due to its potential to allow remote code execution via a specially crafted request.
To fix CVE-2012-0271, upgrade to Novell GroupWise version 8.0.3 HP1 or later, or the 2012 version with Service Pack 1.
CVE-2012-0271 affects Novell GroupWise versions 8.0, 8.01, 8.02, and 2012 before Service Pack 1, along with several other versions listed in the advisory.
CVE-2012-0271 can be exploited through a crafted request that triggers a heap-based buffer overflow.
Yes, CVE-2012-0271 is a publicly disclosed vulnerability and should be addressed promptly to mitigate risk.