GroupWise CVE-2014-0610 Multiple Untrusted Pointer Dereference Remote Code Execution Vulnerabilities
BID:69649
Info
GroupWise CVE-2014-0610 Multiple Untrusted Pointer Dereference Remote Code Execution Vulnerabilities
| Bugtraq ID: | 69649 |
| Class: | Design Error |
| CVE: |
CVE-2014-0610 |
| Remote: | Yes |
| Local: | No |
| Published: | Aug 20 2014 12:00AM |
| Updated: | Aug 20 2014 12:00AM |
| Credit: | Brian Mariani |
| Vulnerable: |
Novell Groupwise 2012 0 Novell Groupwise 8.0.3 HP3 Novell Groupwise 8.0.3 HP1 Novell Groupwise 8.0.3 HP 2 Novell Groupwise 2014 Novell Groupwise 2012 SP2 Novell Groupwise 2012 Sp1 Hp1 Novell Groupwise 2012 Sp1 |
| Not Vulnerable: |
Novell Groupwise 8.0.3 HP4 Novell Groupwise 2014 SP1 Novell Groupwise 2012 SP3 |
Discussion
GroupWise CVE-2014-0610 Multiple Untrusted Pointer Dereference Remote Code Execution Vulnerabilities
Novell GroupWise is prone to multiple remote code-execution vulnerabilities.
An attacker may exploit these issues to execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions.
Novell GroupWise is prone to multiple remote code-execution vulnerabilities.
An attacker may exploit these issues to execute arbitrary code. Failed exploit attempts will likely result in denial-of-service conditions.
Exploit / POC
GroupWise CVE-2014-0610 Multiple Untrusted Pointer Dereference Remote Code Execution Vulnerabilities
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Currently, we are not aware of any working exploits. If you feel we are in error or if you are aware of more recent information, please mail us at: [email protected].
Solution / Fix
GroupWise CVE-2014-0610 Multiple Untrusted Pointer Dereference Remote Code Execution Vulnerabilities
Solution:
Updates are available. Please see the references or vendor advisory for more information.
Solution:
Updates are available. Please see the references or vendor advisory for more information.