GroupWise Internet Agent < 8.0.2 HP3 iCalendar TZNAME Property Heap Overflow

critical Nessus Plugin ID 56634
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote host has an email application that is affected by a heap overflow vulnerability.

Description

The version of Novell GroupWise Internet Agent hosted on the remote computer is earlier than 8.0.2 HP3. Such versions are potentially affected by a heap overflow vulnerability due to the way the application parses the TZNAME property of the VTIMEZONE component within a received VCALENDAR message. Successful exploitation could result in remote code execution.

This script tries to send a VCALENDAR message with a large TZNAME property value in an attempt to crash the Internet Agent (gwia.exe).

Note that when restarting the Internet Agent after a crash, the queued files under <domain_database_path>\wpgate\GWIA\receive that are generated as a result of running this script need to be removed.
Otherwise, the service will not restart.

Also note that the iCal service has to be enabled (the '/imip' setting in 'gwia.cfg') for this vulnerability to be triggered.

Further note that this install of Group GroupWise Internet Agent is also likely affected by other vulnerabilities, but this plugin does not test for them.

Solution

Update GWIA to version 8.0.2 Hot Patch 3 or later.

See Also

http://www.nessus.org/u?8f078d7e

https://secuniaresearch.flexerasoftware.com/secunia_research/2011-66/

https://secuniaresearch.flexerasoftware.com/advisories/43513

Plugin Details

Severity: Critical

ID: 56634

File Name: groupwise_ia_tzname_vuln.nasl

Version: 1.6

Type: remote

Published: 10/25/2011

Updated: 11/15/2018

Dependencies: smtpserver_detect.nasl

Configuration: Enable paranoid mode

Risk Information

VPR

Risk Factor: Medium

Score: 5.9

CVSS v2

Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:novell:groupwise

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 9/26/2011

Vulnerability Publication Date: 9/26/2011

Reference Information

CVE: CVE-2011-0333

BID: 49774