ID CVE-2010-4711
Summary Double free vulnerability in the IMAP server component in GroupWise Internet Agent (GWIA) in Novell GroupWise before 8.02HP allows remote attackers to execute arbitrary code via a large parameter in a LIST command.
References
Vulnerable Configurations
  • cpe:2.3:a:novell:groupwise:4.1:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:4.1:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:4.1a:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:4.1a:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:5.0:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:5.0:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:5.1:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:5.1:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:5.2:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:5.5:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:5.5:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:5.5:*:enhancement_pack:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:5.5:*:enhancement_pack:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:5.57e:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:5.57e:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.0:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.0:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.0:sp1:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.0:sp1:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.0:sp5:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.0:sp5:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.0.1:sp1:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5:sp1:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5:sp1:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5:sp2:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5:sp2:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5:sp3:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5:sp3:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5:sp4:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5:sp4:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5:sp5:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5:sp5:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5:sp6:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5:sp6:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5.2:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5.2:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5.3:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5.3:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5.4:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5.4:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5.6:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5.6:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:6.5.7:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:6.5.7:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.0:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.0:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.0.2:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.0.2:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.0.3:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.0.3:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.0.4:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.0.4:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:8.0:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:8.0.1:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:8.0.1:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:-:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:-:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.0.3:hp4:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.0.3:hp4:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.0.3:hp5:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.0.3:hp5:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.0.4:ftf:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.0.4:ftf:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.01:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.01:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.01:ir1:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.01:ir1:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.02:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.02:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.02:hp1:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.02:hp1:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.02:hp1a:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.02:hp1a:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.02:hp2:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.02:hp2:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.02:hp2r1:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.02:hp2r1:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.03:*:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.03:*:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.03:hp:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.03:hp:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.03:hp2:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.03:hp2:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.03:hp3:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.03:hp3:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:7.03:hp3\+ftf:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:7.03:hp3\+ftf:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:8.00:hp1:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:8.00:hp1:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:8.00:hp2:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:8.00:hp2:*:*:*:*:*:*
  • cpe:2.3:a:novell:groupwise:8.00:hp3:*:*:*:*:*:*
    cpe:2.3:a:novell:groupwise:8.00:hp3:*:*:*:*:*:*
CVSS
Base: 10.0 (as of 26-04-2011 - 20:54)
Impact:
Exploitability:
CWE CWE-399
CAPEC
Access
VectorComplexityAuthentication
NETWORK LOW NONE
Impact
ConfidentialityIntegrityAvailability
COMPLETE COMPLETE COMPLETE
cvss-vector via4 AV:N/AC:L/Au:N/C:C/I:C/A:C
refmap via4
confirm
misc http://zerodayinitiative.com/advisories/ZDI-10-242/
Last major update 26-04-2011 - 20:54
Published 31-01-2011 - 20:00
Last modified 26-04-2011 - 20:54
Back to Top