---------------------------------------------------------------------- Are you missing: SECUNIA ADVISORY ID: Critical: Impact: Where: within the advisory below? This is now part of the Secunia commercial solutions. Click here to learn more about our commercial solutions: http://secunia.com/advisories/business_solutions/ Click here to trial our solutions: http://secunia.com/advisories/try_vi/ ---------------------------------------------------------------------- TITLE: Novell GroupWise Multiple Vulnerabilities SECUNIA ADVISORY ID: SA35177 VERIFY ADVISORY: http://secunia.com/advisories/35177/ DESCRIPTION: Some vulnerabilities have been reported in Novell GroupWise, which can be exploited by malicious people to bypass certain security restrictions, conduct cross-site scripting and script insertion attacks, or potentially compromise a vulnerable system. 1) Multiple errors in the session management mechanism can be exploited to potentially gain access to an authenticated user's account. 2) Input passed via style expressions is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when a specially crafted message is viewed. 3) Certain unspecified input is not properly sanitised before being used. This can be exploited to insert arbitrary HTML and script code, which is executed in a user's browser session in context of an affected site when a specially crafted message is viewed. 4) Input passed via the "GWAP.version" and "User.Theme" parameters to the login page ("gw/webacc") is not properly sanitised before being returned to the user. This can be exploited to execute arbitrary HTML and script code in a user's browser session in context of an affected site. 5) An unspecified error in the Novell GroupWise Internet Agent can be exploited to potentially execute arbitrary code via specially crafted SMTP requests. 6) An error in the Novell GroupWise Internet Agent when processing email addresses can be exploited to potentially execute arbitrary code via specially crafted SMTP requests. The vulnerabilities are reported in versions prior to 7.03 HP3 and 8.0 HP2. SOLUTION: Apply 7.03 HP3 or 8.0 HP2. PROVIDED AND/OR DISCOVERED BY: The vendor credits: 1, 2) Jim LaValley of LaValley Consulting 3) Gregory DuChemin 4) Scott White, Secure State 5, 6) Nicolas Joly, Vupen ORIGINAL ADVISORY: Novell: http://www.novell.com/support/viewContent.do?externalId=7003266 http://www.novell.com/support/viewContent.do?externalId=7003267 http://www.novell.com/support/viewContent.do?externalId=7003268 http://www.novell.com/support/viewContent.do?externalId=7003271 http://www.novell.com/support/viewContent.do?externalId=7003272 http://www.novell.com/support/viewContent.do?externalId=7003273 SecureState: http://packetstorm.linuxsecurity.com/0905-exploits/groupwise-xss.txt ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------