Vulnerability Description
Heap-based buffer overflow in the NgwiCalVTimeZoneBody::ParseSelf function in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to execute arbitrary code via a crafted TZNAME variable in a VCALENDAR attachment in an e-mail message, related to an "integer truncation error."
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Novell | Groupwise | 8.0 |
Related Weaknesses (CWE)
References
- http://secunia.com/secunia_research/2011-66/Vendor Advisory
- http://www.novell.com/support/viewContent.do?externalId=7009208Vendor Advisory
- https://bugzilla.novell.com/show_bug.cgi?id=678715
- https://labs.idefense.com/verisign/intelligence/2009/vulnerabilities/display.php
- http://secunia.com/secunia_research/2011-66/Vendor Advisory
- http://www.novell.com/support/viewContent.do?externalId=7009208Vendor Advisory
- https://bugzilla.novell.com/show_bug.cgi?id=678715
- https://labs.idefense.com/verisign/intelligence/2009/vulnerabilities/display.php
FAQ
What is CVE-2011-0333?
CVE-2011-0333 is a vulnerability with a CVSS score of 10.0 (HIGH). Heap-based buffer overflow in the NgwiCalVTimeZoneBody::ParseSelf function in gwwww1.dll in GroupWise Internet Agent (GWIA) in Novell GroupWise 8.0 before HP3 allows remote attackers to execute arbitr...
How severe is CVE-2011-0333?
CVE-2011-0333 has been rated HIGH with a CVSS base score of 10.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2011-0333?
Check the references section above for vendor advisories and patch information. Affected products include: Novell Groupwise.