Korean
<< Back
VID 23190
Severity 40
Port 7205,7211
Protocol TCP
Class Daemon
Detailed Description The Novell Groupwise WebAccess, according to its banner, has a buffer overflow vulnerability in processing HTTP Basic authentication. Novell GroupWise (GW) WebAccess versions prior to 7.0 SP2 are vulnerable to a stack-based buffer overflow vulnerability, caused by improper handling of an HTTP Basic authentication request by GWINTER.exe. By sending a specialy-crafted request, a remote attacker could exploit this exploit to execute code on the affected host with adminsitrative privileges.

* Note: This check solely relied on the banner of the remote HTTP server to assess this vulnerability, so this might be a false positive.

* References:
http://www.securityfocus.com/archive/1/archive/1/466212/100/0/threaded
http://www.zerodayinitiative.com/advisories/ZDI-07-015.html
http://www.frsirt.com/english/advisories/2007/1455
http://www.securitytracker.com/id?1017932
http://secunia.com/advisories/24944

* Platforms Affected:
Novell GroupWise 7.0
Novell GroupWise 7.0 SP1
Novell NetWare 5.1, 6, 6.5
Microsoft Windows Any version
SuSE Linux Enterprise Server Any version
Recommendation Apply the appropriate patch for Novell Groupwise WebAccess, available from the following Novell Download Web Sites:
http://download.novell.com/Download?buildid=8RF83go0nZg~
http://download.novell.com/Download?buildid=O9ucpbS1bK0~
Related URL CVE-2007-2171 (CVE)
Related URL 23556 (SecurityFocus)
Related URL 33744 (ISS)