GroupWise Internet Agent < 8.0.2 HP3 iCalendar TZNAME Property Heap Overflow

critical Nessus Plugin ID 56634


The remote host has an email application that is affected by a heap overflow vulnerability.


The version of Novell GroupWise Internet Agent hosted on the remote computer is earlier than 8.0.2 HP3. Such versions are potentially affected by a heap overflow vulnerability due to the way the application parses the TZNAME property of the VTIMEZONE component within a received VCALENDAR message. Successful exploitation could result in remote code execution.

This script tries to send a VCALENDAR message with a large TZNAME property value in an attempt to crash the Internet Agent (gwia.exe).

Note that when restarting the Internet Agent after a crash, the queued files under <domain_database_path>\wpgate\GWIA\receive that are generated as a result of running this script need to be removed.
Otherwise, the service will not restart.

Also note that the iCal service has to be enabled (the '/imip' setting in 'gwia.cfg') for this vulnerability to be triggered.

Further note that this install of Group GroupWise Internet Agent is also likely affected by other vulnerabilities, but this plugin does not test for them.


Update GWIA to version 8.0.2 Hot Patch 3 or later.

See Also

Plugin Details

Severity: Critical

ID: 56634

File Name: groupwise_ia_tzname_vuln.nasl

Version: 1.6

Type: remote

Published: 10/25/2011

Updated: 11/15/2018

Configuration: Enable paranoid mode

Risk Information


Risk Factor: Medium

Score: 5.9


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.4

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Information

CPE: cpe:/a:novell:groupwise

Required KB Items: Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 9/26/2011

Vulnerability Publication Date: 9/26/2011

Reference Information

CVE: CVE-2011-0333

BID: 49774