----------------------------------------------------------------------

Are you missing:

SECUNIA ADVISORY ID:

Critical:

Impact:

Where:

within the advisory below?

This is now part of the Secunia commercial solutions.

Click here to learn more about our commercial solutions:
http://secunia.com/advisories/business_solutions/
        
Click here to trial our solutions:
http://secunia.com/advisories/try_vi/

----------------------------------------------------------------------

TITLE:
Novell GroupWise Multiple Vulnerabilities

SECUNIA ADVISORY ID:
SA35177

VERIFY ADVISORY:
http://secunia.com/advisories/35177/

DESCRIPTION:
Some vulnerabilities have been reported in Novell GroupWise, which
can be exploited by malicious people to bypass certain security
restrictions, conduct cross-site scripting and script insertion
attacks, or potentially compromise a vulnerable system.

1) Multiple errors in the session management mechanism can be
exploited to potentially gain access to an authenticated user's
account.

2) Input passed via style expressions is not properly sanitised
before being used. This can be exploited to insert arbitrary HTML and
script code, which is executed in a user's browser session in context
of an affected site when a specially crafted message is viewed.

3) Certain unspecified input is not properly sanitised before being
used. This can be exploited to insert arbitrary HTML and script code,
which is executed in a user's browser session in context of an
affected site when a specially crafted message  is viewed.

4) Input passed via the "GWAP.version" and "User.Theme" parameters to
the login page ("gw/webacc") is not properly sanitised before being
returned to the user. This can be exploited to execute arbitrary HTML
and script code in a user's browser session in context of an affected
site.

5) An unspecified error in the Novell GroupWise Internet Agent can be
exploited to potentially execute arbitrary code via specially crafted
SMTP requests.
  
6) An error in the Novell GroupWise Internet Agent when processing
email addresses can be exploited to potentially execute arbitrary
code via specially crafted SMTP requests.

The vulnerabilities are reported in versions prior to 7.03 HP3 and
8.0 HP2.

SOLUTION:
Apply 7.03 HP3 or 8.0 HP2.

PROVIDED AND/OR DISCOVERED BY:
The vendor credits:
1, 2) Jim LaValley of LaValley Consulting
3) Gregory DuChemin
4) Scott White, Secure State
5, 6) Nicolas Joly, Vupen

ORIGINAL ADVISORY:
Novell:
http://www.novell.com/support/viewContent.do?externalId=7003266
http://www.novell.com/support/viewContent.do?externalId=7003267
http://www.novell.com/support/viewContent.do?externalId=7003268
http://www.novell.com/support/viewContent.do?externalId=7003271
http://www.novell.com/support/viewContent.do?externalId=7003272
http://www.novell.com/support/viewContent.do?externalId=7003273

SecureState:
http://packetstorm.linuxsecurity.com/0905-exploits/groupwise-xss.txt

----------------------------------------------------------------------

About:
This Advisory was delivered by Secunia as a free service to help
everybody keeping their systems up to date against the latest
vulnerabilities.

Subscribe:
http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.)
http://secunia.com/advisories/about_secunia_advisories/


Please Note:
Secunia recommends that you verify all advisories you receive by
clicking the link.
Secunia NEVER sends attached files with advisories.
Secunia does not advise people to install third party patches, only
use those supplied by the vendor.

----------------------------------------------------------------------

Unsubscribe: Secunia Security Advisories
http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

----------------------------------------------------------------------