Nytro Posted April 3, 2013 Report Posted April 3, 2013 [h=1]Novell GroupWise Untrusted Pointer Dereference Exploitation[/h]April 3, 2013 [TABLE][TR][TD]Authors: [/TD][TD]Brian Mariani, Senior Security Auditor, High-Tech Bridge Frederic Bourla, Chief Security Specialist, High-Tech Bridge[/TD][/TR][/TABLE] On the 24th of November 2012 High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in Novell GroupWise 2012. On the 26th November 2012, High-Tech Bridge Security Research Lab informed Novell about these vulnerabilities, which existed in two core ActiveX modules. On the 30th of January 2013, Novell published Security Bulletin and released a security patch. Finally, on the 3rd of April 2013 High-Tech Bridge Security Research Lab disclosed advisory details. This paper demonstrates vulnerability exploitation to execute arbitrary code on the vulnerable system. PDF: Novell GroupeWise Untrusted Pointer Dereference (1,0 MB)Video: Novell GroupWise Untrusted Pointer Dereference ExploitationExploit files (Novell-GroupWise-exploit.rar) password: htbridge (5 kB)Sursa: https://www.htbridge.com/publications/novell_groupwise_untrusted_pointer_dereference_exploitation.html Quote