---------------------------------------------------------------------- Secunia customers receive relevant and filtered advisories. Delivery is done via different channels including SMS, Email, Web, and https based XML feed. http://corporate.secunia.com/trial/38/request/ ---------------------------------------------------------------------- TITLE: Novell GroupWise WebAccess Base64 Decoding Buffer Overflow SECUNIA ADVISORY ID: SA24944 VERIFY ADVISORY: http://secunia.com/advisories/24944/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Novell GroupWise 7.x http://secunia.com/product/5667/ DESCRIPTION: A vulnerability has been reported in Novell GroupWise, which can be exploited by malicious people to compromise a vulnerable system. The vulnerability is caused due to an error within the handling of base64 data supplied via HTTP authentication requests. This can be exploited to cause a stack based buffer overflow via a specially crafted request containing overly large data (at least 336 bytes). Successful exploitation may allow execution of arbitrary code. SOLUTION: Update to version 7.0 SP2. GroupWise 7 SP2 Win/NLM Full US and MULTI 7.0.2: http://download.novell.com/Download?buildid=8RF83go0nZg~ GroupWise 7 SP2 Linux US and MULTI 7.0.2: http://download.novell.com/Download?buildid=O9ucpbS1bK0~ PROVIDED AND/OR DISCOVERED BY: Tenable Network Security, reported via ZDI ORIGINAL ADVISORY: http://www.zerodayinitiative.com/advisories/ZDI-07-015.html ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------