CVE-2006-3268
CVSS5.0
发布时间 :2006-06-29 13:05:00
修订时间 :2011-03-07 21:38:14
NMCOPS    

[原文]Unspecified vulnerability in the Windows Client API in Novell GroupWise 5.x through 7 might allow users to obtain "random programmatic access" to other email within the same post office.


[CNNVD]Novell Groupwise Windows客户端API 非授权邮件 访问控制绕过漏洞(CNNVD-200606-592)

        Novell GroupWise是一款跨平台协作软件。
        Novell GroupWise的客户端API实现上存在漏洞,攻击者可能利用漏洞绕过安全限制,访问某些非授权的邮件。

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: NONE [对系统可用性无影响]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:novell:groupwise:6.5.3Novell Groupwise 6.5.3
cpe:/a:novell:groupwise:::32-bit_client
cpe:/a:novell:groupwise:6.0Novell Groupwise 6.0
cpe:/a:novell:groupwise:6.5.2Novell Groupwise 6.5.2
cpe:/a:novell:groupwise:6.0:sp4
cpe:/a:novell:groupwise:6.5:sp5Novell Groupwise 6.5 SP5
cpe:/a:novell:groupwise:5.5Novell Groupwise 5.5
cpe:/a:novell:groupwise:6.5:sp2Novell Groupwise 6.5 SP2
cpe:/a:novell:groupwise:5.2Novell Groupwise 5.2
cpe:/a:novell:groupwise:6.5:sp1Novell Groupwise 6.5 SP1
cpe:/a:novell:groupwise:6.5Novell Groupwise 6.5
cpe:/a:novell:groupwise:6.5.4Novell Groupwise 6.5.4
cpe:/a:novell:groupwise:6.5:sp3Novell Groupwise 6.5 SP3
cpe:/a:novell:groupwise:6.0:sp2
cpe:/a:novell:groupwise:6.5:sp4Novell Groupwise 6.5 SP4
cpe:/a:novell:groupwise:6.0:sp3
cpe:/a:novell:groupwise:7.0Novell Groupwise 7.0
cpe:/a:novell:groupwise:6.0:sp1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-3268
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2006-3268
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200606-592
(官方数据源) CNNVD

- 其它链接及资源

http://www.securityfocus.com/bid/18716
(PATCH)  BID  18716
http://support.novell.com/cgi-bin/search/searchtid.cgi?2974027.htm
(PATCH)  CONFIRM  http://support.novell.com/cgi-bin/search/searchtid.cgi?2974027.htm
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974006.htm
(PATCH)  CONFIRM  http://support.novell.com/cgi-bin/search/searchtid.cgi?/2974006.htm
http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973921.htm
(PATCH)  CONFIRM  http://support.novell.com/cgi-bin/search/searchtid.cgi?/2973921.htm
http://secunia.com/advisories/20888
(VENDOR_ADVISORY)  SECUNIA  20888
http://www.vupen.com/english/advisories/2006/2594
(UNKNOWN)  VUPEN  ADV-2006-2594
http://xforce.iss.net/xforce/xfdb/27550
(UNKNOWN)  XF  groupwise-windows-client-api-security-bypass(27550)
http://www.securityfocus.com/archive/1/archive/1/438725/100/0/threaded
(UNKNOWN)  BUGTRAQ  20060629 Novell Security Announcement NOVELL-SA:2006:001
http://securitytracker.com/id?1016404
(UNKNOWN)  SECTRACK  1016404

- 漏洞信息

Novell Groupwise Windows客户端API 非授权邮件 访问控制绕过漏洞
中危 访问验证错误
2006-06-29 00:00:00 2006-07-03 00:00:00
远程  
        Novell GroupWise是一款跨平台协作软件。
        Novell GroupWise的客户端API实现上存在漏洞,攻击者可能利用漏洞绕过安全限制,访问某些非授权的邮件。

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        GroupWise 6.5:
        Apply SP6 Client Update 1
        http://support.novell.com/filefinder/16963/index.html
        GroupWise 7:
        Apply GroupWise 7 SP1
        http://support.novell.com/filefinder/20641/index.html

- 漏洞信息 (F47916)

NOVELL-SA-2006-001.txt (PacketStormID:F47916)
2006-07-02 00:00:00
 
advisory
windows
CVE-2006-3268
[点击下载]

Novell Security Announcement - A security vulnerability exists in the GroupWise Windows Client API that can allow random programmatic access to non-authorized email within the same authenticated post office. Affected Products: Novell GroupWise 5.x, Novell GroupWise 6.0, Novell GroupWise 6.5, Novell GroupWise 7, Novell GroupWise 32-bit Client.

-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

                   Novell Security Announcement

Product Name:		Novell GroupWise
Announcement ID:        NOVELL-SA:2006:001
Date:                   Wed Jun 28 13:00:00 MDT 2006
Affected Products:	Novell GroupWise 5.x
			Novell GroupWise 6.0
			Novell GroupWise 6.5
			Novell GroupWise 7
			Novell GroupWise 32-bit Client
Vulnerability Type:     Unauthorized access to email
Severity (1-10):        8
Cross-References:       CVE-2006-3268

Content of This Advisory:
        1) Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Patch Location
        5) Authenticity Verification and Additional Information
        6) Disclaimer
        7) Novell Security Public Key


________________________________________________________________________

1) Problem Description and Brief Discussion

   A security vulnerability exists in the GroupWise Windows Client API
   that can allow random programmatic access to non-authorized email
   within the same authenticated post office.

2) Solution or Work-Around

   There is no known workaround.  Please follow the instructions below
   to install the patch.

   For GroupWise 7 - Customers running GroupWise 7.0 Windows Clients
   should immediately upgrade all Windows clients to GroupWise 7 SP1
   (dated 19 Jun 2006) and lock out older Windows clients via
   ConsoleOne.

   For GroupWise 6.5 - Customers running GroupWise 6.5.x Windows Clients
   should immediately upgrade all Windows clients to the GroupWise 6.5
   SP6 Client Update 1 (dated 27 Jun 2006), or upgrade to GroupWise 7
   SP1.  Older Windows clients must be locked out via ConsoleOne.

   For GroupWise 6.0 and previous - Customers still running unsupported
   GroupWise versions (5.x and 6) of the Windows Clients should
   immediately upgrade clients and servers to either GroupWise 6.5 SP6
   Update 1 or to GroupWise 7 SP1.  Older Windows clients must be
   locked out via ConsoleOne.
   
   If Blackberry Enterprise Server (BES) is installed in a GroupWise 7
   environment then make sure to lock out based on client date rather
   than client version, as the recommended BES configuration is still
   to use the GroupWise 6.5 client.  The recommended date should be
   June 13 2006 in order to ensure that the system is not vulnerable.

3) Special Instructions and Notes

   For instructions on locking out older client versions and other
   details please refer to Novell Support TID# 1480
   @ http://www.novell.com/support. (Check box to search by TID ID).
   
4) Patch Location

   GroupWise 6.5
   http://support.novell.com/filefinder/16963/index.html

   GroupWise 7
   http://support.novell.com/filefinder/20641/index.html


________________________________________________________________________

5) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    Novell security announcements are published via a mailing list and
    on a Novell web site.  The authenticity and integrity of a Novell
    security announcement is guaranteed by a cryptographic signature in
    each announcement.  All Novell security announcements are published
    with a valid signature.

    To verify the signature of the announcement, save it as text into a
    file and run the command

      gpg --verify <file>

    replacing <file> with the name of the file where you saved the
    announcement.  The output for a valid signature looks like:

      gpg: Signature made <DATE> using RSA key ID 6AE6EC98
      gpg: Good signature from "Novell Security (Primary Contact
      Address) <security@novell.com>"

    where <DATE> is replaced by the date the document was signed.

    If the Novell Security key is not contained in your key ring, you
    can import it from 
      http://support.novell.com/security-alerts/keypage.txt.
    The <security@novell.com> public key is also included below.

    To import the key, use the command

      gpg --import keypage.txt

  - Novell publishes security announcements to the mailing list
    security-alerts@lists.novell.com.  Any interested party may
    subscribe at http://www.novell.com/company/subscribe/.

    Novell's security contact is security@novell.com.  

  - The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way. In
    particular, the clear text signature should show proof of the
    authenticity of the text.
________________________________________________________________________

6) Disclaimer

    The content of this document is believed to be accurate at the time
    of publishing based on currently available information. However, the
    information is provided "AS IS" without any warranty or
    representation.  Your use of the document constitutes acceptance of
    this disclaimer.  Novell disclaims all warranties, express or
    implied, regarding this document, including the warranties of
    merchantability and fitness for a particular purpose. Novell is not
    liable for any direct, indirect, or consequential loss or damage
    arising from use of, or reliance on, this document or any security
    alert, even if Novell has been advised of the possibility of such
    damages and even if such damages are foreseeable.

________________________________________________________________________

7) Novell Security Public Key

Type Bits/KeyID      Date        User ID
pub  4096R/6AE6EC98 2006-04-25  Novell Security <security@novell.com>

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2.2 (MingW32)
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=h2ya
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)
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=5avL
-----END PGP SIGNATURE-----


    

- 漏洞信息

26921
Novell GroupWise Windows Client Arbitrary Email Access
Vendor Verified

- 漏洞描述

Unknown or Incomplete

- 时间线

2006-06-19 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Novell Groupwise Windows Client API Unauthorized Email Access Vulnerability
Access Validation Error 18716
Yes No
2006-06-29 12:00:00 2006-06-29 05:19:00
The vendor disclosed this issue.

- 受影响的程序版本

Novell Groupwise 32-bit Client 0
Novell Groupwise 7.0
Novell Groupwise 6.5.4
Novell Groupwise 6.5.3
Novell Groupwise 6.5.2
Novell Groupwise 6.5 SP5
Novell Groupwise 6.5 SP4
Novell Groupwise 6.5 SP3
Novell Groupwise 6.5 SP2
Novell Groupwise 6.5 SP1
Novell Groupwise 6.5
Novell Groupwise 6.0 SP4
Novell Groupwise 6.0 SP3
Novell Groupwise 6.0 SP2
Novell Groupwise 6.0 SP1
Novell Groupwise 6.0
Novell Groupwise 5.5
- Novell Netware 5.0
- Novell Netware 4.11
Novell Groupwise 5.2
- Novell Netware 5.0
- Novell Netware 4.11

- 漏洞讨论

The Groupwise Windows Client API has an unspecified vulnerability that allows an attacker to bypass security controls and gain unauthorized access to email stores.

An attacker can exploit this issue to access email of another user in the same authenticated post office.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@symantec.com.

- 解决方案

Novell has released updated versions of the affected software to address this issue.


Novell Groupwise 6.5 SP3

Novell Groupwise 6.5 SP2

Novell Groupwise 6.5

Novell Groupwise 6.5 SP5

Novell Groupwise 6.5 SP1

Novell Groupwise 6.5 SP4

Novell Groupwise 7.0

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站