---------------------------------------------------------------------- Reverse Engineer Wanted Secunia offers a Security Specialist position with emphasis on reverse engineering of software and exploit code, auditing of source code, and analysis of vulnerability reports. http://secunia.com/secunia_security_specialist/ ---------------------------------------------------------------------- TITLE: Novell GroupWise Windows Client Email Access Vulnerability SECUNIA ADVISORY ID: SA20888 VERIFY ADVISORY: http://secunia.com/advisories/20888/ CRITICAL: Moderately critical IMPACT: Security Bypass WHERE: >From remote SOFTWARE: Novell GroupWise 7.x http://secunia.com/product/5667/ Novell Groupwise 6.x http://secunia.com/product/86/ Novell Groupwise 5.x http://secunia.com/product/236/ DESCRIPTION: A vulnerability has been reported in Novell GroupWise, which can be exploited by malicious users to bypass certain security restrictions. The vulnerability is caused due to an error within the GroupWise Windows Client API. This can be exploited to gain programmatic access to certain non-authorised emails within the same authenticated post office. The vulnerability has been reported in the following versions: * Novell GroupWise 5.x * Novell GroupWise 6.0 * Novell GroupWise 6.5 * Novell GroupWise 7 * Novell GroupWise 32-bit Client SOLUTION: Apply updates. GroupWise 6.5: Apply SP6 Client Update 1 (dated 2006-06-27) http://support.novell.com/filefinder/16963/index.html GroupWise 7: Apply GroupWise 7 SP1 (dated 2006-06-19) http://support.novell.com/filefinder/20641/index.html The vendor recommends users of unsupported GroupWise versions (5.x and 6) to upgrade to either GroupWise 6.5 SP6 Update 1 or to GroupWise 7 SP1. NOTE: The vendor recommends that older Windows clients must be locked out via ConsoleOne after the update. If Blackberry Enterprise Server (BES) is installed in a GroupWise 7 environment then the lock out should based on client date rather than client version. The recommended lock out date is 2006-06-13 to ensure that the system is not vulnerable. PROVIDED AND/OR DISCOVERED BY: Reported by the vendor. ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------