GroupWise Internet Agent < 8.0.2 HP3 iCalendar TZNAME Property Heap Overflow

Critical Nessus Plugin ID 56634

Synopsis

The remote host has an email application that is affected by a heap overflow vulnerability.

Description

The version of Novell GroupWise Internet Agent hosted on the remote computer is earlier than 8.0.2 HP3. Such versions are potentially affected by a heap overflow vulnerability due to the way the application parses the TZNAME property of the VTIMEZONE component within a received VCALENDAR message. Successful exploitation could result in remote code execution.

This script tries to send a VCALENDAR message with a large TZNAME property value in an attempt to crash the Internet Agent (gwia.exe).

Note that when restarting the Internet Agent after a crash, the queued files under <domain_database_path>\wpgate\GWIA\receive that are generated as a result of running this script need to be removed.
Otherwise, the service will not restart.

Also note that the iCal service has to be enabled (the '/imip' setting in 'gwia.cfg') for this vulnerability to be triggered.

Further note that this install of Group GroupWise Internet Agent is also likely affected by other vulnerabilities, but this plugin does not test for them.

Solution

Update GWIA to version 8.0.2 Hot Patch 3 or later.

See Also

http://www.nessus.org/u?8f078d7e

https://secuniaresearch.flexerasoftware.com/secunia_research/2011-66/

https://secuniaresearch.flexerasoftware.com/advisories/43513

Plugin Details

Severity: Critical

ID: 56634

File Name: groupwise_ia_tzname_vuln.nasl

Version: 1.6

Type: remote

Published: 2011/10/25

Updated: 2018/11/15

Dependencies: 10263

Configuration: Enable paranoid mode

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:novell:groupwise

Required KB Items: Settings/ParanoidReport

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2011/09/26

Vulnerability Publication Date: 2011/09/26

Reference Information

CVE: CVE-2011-0333

BID: 49774