GSD-2009-1636
Vulnerability from gsd - Updated: 2023-12-13 01:19Details
Multiple buffer overflows in the Internet Agent (aka GWIA) component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 allow remote attackers to execute arbitrary code via (1) a crafted e-mail address in an SMTP session or (2) an SMTP command.
Aliases
Aliases
{
"GSD": {
"alias": "CVE-2009-1636",
"description": "Multiple buffer overflows in the Internet Agent (aka GWIA) component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 allow remote attackers to execute arbitrary code via (1) a crafted e-mail address in an SMTP session or (2) an SMTP command.",
"id": "GSD-2009-1636"
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2009-1636"
],
"details": "Multiple buffer overflows in the Internet Agent (aka GWIA) component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 allow remote attackers to execute arbitrary code via (1) a crafted e-mail address in an SMTP session or (2) an SMTP command.",
"id": "GSD-2009-1636",
"modified": "2023-12-13T01:19:47.408531Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-1636",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "Multiple buffer overflows in the Internet Agent (aka GWIA) component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 allow remote attackers to execute arbitrary code via (1) a crafted e-mail address in an SMTP session or (2) an SMTP command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2009-1393",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2009/1393"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=482914",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=482914"
},
{
"name": "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_SMTP_Command_Remote_Buffer_Overflow_PoC_Exploit_1393140.php",
"refsource": "MISC",
"url": "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_SMTP_Command_Remote_Buffer_Overflow_PoC_Exploit_1393140.php"
},
{
"name": "35177",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/35177"
},
{
"name": "35064",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35064"
},
{
"name": "54644",
"refsource": "OSVDB",
"url": "http://osvdb.org/54644"
},
{
"name": "gia-email-code-execution(50693)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50693"
},
{
"name": "1022276",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1022276"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=478892",
"refsource": "MISC",
"url": "https://bugzilla.novell.com/show_bug.cgi?id=478892"
},
{
"name": "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_Email_Address_Remote_Buffer_Overflow_Exploit_1393141.php",
"refsource": "MISC",
"url": "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_Email_Address_Remote_Buffer_Overflow_Exploit_1393141.php"
},
{
"name": "35065",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/35065"
},
{
"name": "20090522 Novell GroupWise Internet Agent Remote Buffer Overflow Vulnerabilities",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/503724/100/0/threaded"
},
{
"name": "gia-smtp-code-execution(50692)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50692"
},
{
"name": "54645",
"refsource": "OSVDB",
"url": "http://osvdb.org/54645"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7003272\u0026sliceId=1",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=7003272\u0026sliceId=1"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7003273\u0026sliceId=1",
"refsource": "CONFIRM",
"url": "http://www.novell.com/support/viewContent.do?externalId=7003273\u0026sliceId=1"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:7.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:7.03:hp1a:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:7.03:hp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:7.0:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:7.0:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:7.01:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:7.0.0:sp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:7.0.0:sp2:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:7.0:sp3:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:7.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:novell:groupwise:8.0:hp1:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2009-1636"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "Multiple buffer overflows in the Internet Agent (aka GWIA) component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 allow remote attackers to execute arbitrary code via (1) a crafted e-mail address in an SMTP session or (2) an SMTP command."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=478892",
"refsource": "MISC",
"tags": [],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=478892"
},
{
"name": "https://bugzilla.novell.com/show_bug.cgi?id=482914",
"refsource": "MISC",
"tags": [],
"url": "https://bugzilla.novell.com/show_bug.cgi?id=482914"
},
{
"name": "35064",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/35064"
},
{
"name": "35177",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/35177"
},
{
"name": "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_Email_Address_Remote_Buffer_Overflow_Exploit_1393141.php",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_Email_Address_Remote_Buffer_Overflow_Exploit_1393141.php"
},
{
"name": "ADV-2009-1393",
"refsource": "VUPEN",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/english/advisories/2009/1393"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7003273\u0026sliceId=1",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.novell.com/support/viewContent.do?externalId=7003273\u0026sliceId=1"
},
{
"name": "35065",
"refsource": "BID",
"tags": [],
"url": "http://www.securityfocus.com/bid/35065"
},
{
"name": "http://www.novell.com/support/viewContent.do?externalId=7003272\u0026sliceId=1",
"refsource": "CONFIRM",
"tags": [],
"url": "http://www.novell.com/support/viewContent.do?externalId=7003272\u0026sliceId=1"
},
{
"name": "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_SMTP_Command_Remote_Buffer_Overflow_PoC_Exploit_1393140.php",
"refsource": "MISC",
"tags": [
"Vendor Advisory"
],
"url": "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_SMTP_Command_Remote_Buffer_Overflow_PoC_Exploit_1393140.php"
},
{
"name": "54644",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/54644"
},
{
"name": "54645",
"refsource": "OSVDB",
"tags": [],
"url": "http://osvdb.org/54645"
},
{
"name": "1022276",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1022276"
},
{
"name": "gia-email-code-execution(50693)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50693"
},
{
"name": "gia-smtp-code-execution(50692)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50692"
},
{
"name": "20090522 Novell GroupWise Internet Agent Remote Buffer Overflow Vulnerabilities",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/503724/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "LOW",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "COMPLETE",
"baseScore": 10.0,
"confidentialityImpact": "COMPLETE",
"integrityImpact": "COMPLETE",
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
"version": "2.0"
},
"exploitabilityScore": 10.0,
"impactScore": 10.0,
"obtainAllPrivilege": true,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "HIGH",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-10T19:37Z",
"publishedDate": "2009-05-26T15:30Z"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…