-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

===========================================================================
                         AUSCERT Security Bulletin

                               ASB-2010.0171
               Multiple vulnerabilities in Novell GroupWise
                               16 July 2010

===========================================================================

        AusCERT Security Bulletin Summary
        ---------------------------------

Product:              Novell GroupWise 7
                      Novell GroupWise 8
                      Novell GroupWise WebAccess
                      Novell GroupWise Message Transfer Agent
                      Novell GroupWise Post Office Agent
                      Novell GroupWise Internet Agent
                      Novell GroupWise WebAccess Agent
                      Novell GroupWise Monitor Agent
Operating System:     Windows
                      Netware
                      Linux variants
Impact/Access:        Access Privileged Data          -- Remote/Unauthenticated
                      Execute Arbitrary Code/Commands -- Existing Account      
                      Cross-site Scripting            -- Remote/Unauthenticated
Resolution:           Patch/Upgrade
Member content until: Sunday, August 15 2010

OVERVIEW

        Multiple vulnerabilities in Novell GroupWise products have been
        corrected by various updates to GroupWise products. [1,2,3,4,5,6,7,8,9]


IMPACT

        Multiple Cross-site Scripting and HTTP Header Injection vulnerabilities
        exist in all the listed products. [1,2,5,6,7,8]
        
        Novell GroupWise 7, 8 and WebAccess could expose authentication data in
        a users web browser. [3]
        
        Novell GroupWise 7, 8, WebAccess and Internet Agent all have stack
        overflow vulnerabilities that require authentication to exploit. [4,9]


MITIGATION

        Various patches and updates have been released to correct these
        vulnerabilities. The following product versions are not vulnerable:
         - GroupWise 8 SP2
         - GroupWise 7.0 post-SP4 Field Test File (FTF)
        
        However as GroupWise 7 has reached end-of life status, one of the
        vulnerabilities requires upgrading to GroupWise 8 SP2. [3]


REFERENCES

        [1] Cross-Site Scripting (XSS) Security Vulnerability in GroupWise
            Agent HTTP interfaces
            http://www.novell.com/support/viewContent.do?externalId=7006371

        [2] Security Vulnerability (HTTP Header Injection) in GroupWise Agent
            HTTP Interfaces
            http://www.novell.com/support/viewContent.do?externalId=7006372

        [3] Security Vulnerability - GroupWise WebAccess Potentially Exposes
            Authentication Information
            http://www.novell.com/support/viewContent.do?externalId=7006373

        [4] GroupWise Internet Agent Stack Overflow Security Vulnerability
            http://www.novell.com/support/viewContent.do?externalId=7006374

        [5] GroupWise WebAccess Javascript Cross-Site Scripting (XSS) Security
            Vulnerability
            http://www.novell.com/support/viewContent.do?externalId=7006375

        [6] GroupWise WebAccess Cross-Site Scripting (XSS) Security
            Vulnerability on Replies
            http://www.novell.com/support/viewContent.do?externalId=7006376

        [7] Security Vulnerability (XSS via Header Injection) in GroupWise
            WebAccess
            http://www.novell.com/support/viewContent.do?externalId=7006377

        [8] GroupWise 8 WebAccess Javascript/HTML injection XSS Security
            Vulnerability
            http://www.novell.com/support/viewContent.do?externalId=7006379

        [9] GroupWise WebAccess Stack Overflow Security Vulnerability
            http://www.novell.com/support/viewContent.do?externalId=7006380

AusCERT has made every effort to ensure that the information contained
in this document is accurate.  However, the decision to use the information
described is the responsibility of each user or organisation. The decision to
follow or act on information or advice contained in this security bulletin is
the responsibility of each user or organisation, and should be considered in
accordance with your organisation's site policies and procedures. AusCERT
takes no responsibility for consequences which may arise from following or
acting on information or advice contained in this security bulletin.

===========================================================================
Australian Computer Emergency Response Team
The University of Queensland
Brisbane
Qld 4072

Internet Email: auscert@auscert.org.au
Facsimile:      (07) 3365 7031
Telephone:      (07) 3365 4417 (International: +61 7 3365 4417)
                AusCERT personnel answer during Queensland business hours 
                which are GMT+10:00 (AEST).
                On call after hours for member emergencies only.
===========================================================================
-----BEGIN PGP SIGNATURE-----
Comment: http://www.auscert.org.au/render.html?it=1967

iD8DBQFMP8Pl/iFOrG6YcBERAqxjAKC71mBOtM/CXl7ejBnlLvodcLNYhQCgyWrN
IyI81BBMOQasvBz+e1qfhhI=
=ZSwk
-----END PGP SIGNATURE-----