Jump to content
Nytro

Novell GroupWise Untrusted Pointer Dereference Exploitation

Recommended Posts

Posted

[h=1]Novell GroupWise Untrusted Pointer Dereference Exploitation[/h]April 3, 2013

[TABLE]

[TR]

[TD]Authors: [/TD]

[TD]Brian Mariani, Senior Security Auditor, High-Tech Bridge

Frederic Bourla, Chief Security Specialist, High-Tech Bridge[/TD]

[/TR]

[/TABLE]

On the 24th of November 2012 High-Tech Bridge Security Research Lab discovered multiple vulnerabilities in Novell GroupWise 2012. On the 26th November 2012, High-Tech Bridge Security Research Lab informed Novell about these vulnerabilities, which existed in two core ActiveX modules. On the 30th of January 2013, Novell published Security Bulletin and released a security patch. Finally, on the 3rd of April 2013 High-Tech Bridge Security Research Lab disclosed advisory details. This paper demonstrates vulnerability exploitation to execute arbitrary code on the vulnerable system.

pdf.gifPDF: Novell GroupeWise Untrusted Pointer Dereference (1,0 MB)

youtube.gifVideo: Novell GroupWise Untrusted Pointer Dereference Exploitation

zip.gifExploit files (Novell-GroupWise-exploit.rar) password: htbridge (5 kB)

Sursa: https://www.htbridge.com/publications/novell_groupwise_untrusted_pointer_dereference_exploitation.html

Join the conversation

You can post now and register later. If you have an account, sign in now to post with your account.

Guest
Reply to this topic...

×   Pasted as rich text.   Paste as plain text instead

  Only 75 emoji are allowed.

×   Your link has been automatically embedded.   Display as a link instead

×   Your previous content has been restored.   Clear editor

×   You cannot paste images directly. Upload or insert images from URL.



×
×
  • Create New...