How to Buy
This script is Copyright (C) 2011-2014 Tenable Network Security, Inc.
The remote host has an email application that is affected by a heap
The version of Novell GroupWise Internet Agent hosted on the remote
computer is earlier than 8.0.2 HP3. Such versions are potentially
affected by a heap overflow vulnerability due to the way the
application parses the TZNAME property of the VTIMEZONE component
within a received VCALENDAR message. Successful exploitation could
result in remote code execution.
This script tries to send a VCALENDAR message with a large TZNAME
property value in an attempt to crash the Internet Agent (gwia.exe).
Note that when restarting the Internet Agent after a crash, the queued
files under <domain_database_path>\wpgate\GWIA\receive that are
generated as a result of running this script need to be removed.
Otherwise, the service will not restart.
Also note that the iCal service has to be enabled (the '/imip' setting
in 'gwia.cfg') for this vulnerability to be triggered.
Further note that this install of Group GroupWise Internet Agent is
also likely affected by other vulnerabilities, but this plugin does
not test for them.
See also :
Update GWIA to version 8.0.2 Hot Patch 3 or later.
Risk factor :
Critical / CVSS Base Score : 10.0
CVSS Temporal Score : 7.4
Public Exploit Available : false
Family: SMTP problems
Nessus Plugin ID: 56634 ()
Bugtraq ID: 49774
CVE ID: CVE-2011-0333
Nessus Professional: Scan unlimited IPs, run compliance checks & moreNessus Cloud: The power of Nessus for teams – from the cloud
The cookie settings on this website are set to 'allow all cookies' to give you the very best website experience. If you continue without changing these settings, you consent to this - but if you want, you can opt out of all cookies by clicking below.