exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

NOVL-2005-10098073.txt

NOVL-2005-10098073.txt
Posted Aug 18, 2005
Site novell.com

The GroupWise client sometimes caches the user name and password in memory while it is running. A hostile user with administrative access to the machine where a user is logged in may dump memory and find username/password pairs of logged in users. Versions below 7 are affected.

tags | advisory
advisories | CVE-2005-2620
SHA-256 | daccc6c0233f0bedb5d274a00e22cbb85f2201a94c36fb64ed82282708ac3f80

NOVL-2005-10098073.txt

Change Mirror Download
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

For Immediate Disclosure

============================== Summary ==============================

Security Alert: NOVL-2005-10098073
Title: GroupWise Password Caching
Date: 16-August-2005
Revision: Original
Product Name: GroupWise 5.x, 6.x
OS/Platform(s): Windows and NetWare
Reference URL: http://support.novell.com/servlet/tidfinder/10098073
Vendor Name: Novell, Inc.
Vendor URL: http://www.novell.com
Security Alerts: http://support.novell.com/security-alerts
Affects: GroupWise Windows Clients & Proxies
Identifiers: Bugtraq:13997, CVE:CAN-2005-2620, SECTRACK:1014247
Credits: securityteam@truedson.com

============================ Description ============================

The GroupWise client sometimes caches the user name and password in
memory while it is running.

============================== Impact ===============================

A hostile user with administrative access to the machine where a user
is logged in may dump memory and find username/password pairs of
logged in users.

======================== Recommended Actions ========================
GW 7 was released with these fixes already applied, so no further
action is required for GroupWise 7 users.

Until the official release of GroupWise 6.5 SP5 in mid-September,
customers wishing to apply Field Test Files (FTF) can download these
from http://support.novell.com/filefinder/ and locate the latest
GroupWise Agents and GroupWise Client FTFs. Currently as of
August 16, 2005 the filenames are fgw655h.exe for Agents and
f32655f7e.exe for GW Client. Both, FTFs will need to be applied
to get the full fix.

See detailed instructions in the referenced Technical Information
Document (TID): http://support.novell.com/servlet/tidfinder/10098073

============================ DISCLAIMER =============================

The content of this document is believed to be accurate at the time
of publishing based on currently available information. However, the
information is provided "AS IS" without any warranty or
representation. Your use of the document constitutes acceptance of
this disclaimer. Novell disclaims all warranties, express or
implied, regarding this document, including the warranties of
merchantability and fitness for a particular purpose. Novell is not
liable for any direct, indirect, or consequential loss or damage
arising from use of, or reliance on, this document or any security
alert, even if Novell has been advised of the possibility of such
damages and even if such damages are foreseeable.

============================ Appendices =============================

None

================ Contacting Novell Security Alerts ==================

To report suspected security vulnerabilities in Novell products,
send email to
secure@novell.com

PGP users may send signed/encrypted information to us using our
PGP key, available from the our website at:

http://support.novell.com/security-alerts


Novell Security Alerts, Novell, Inc. PGP Key Fingerprint:

3C6B 3F26 4E34 1ADF E27B D6C4 1AC8 9184 34D1 9739

========================= Revision History ==========================
Original: 16-Aug-2005 - Original Publication

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iD8DBQFDA4GUGsiRhDTRlzkRAhDnAKCrwSIzonYqwbKjxmsm+CSlvwsqiwCg+Qdn
gK8fuk3uLS6wUY1S97pV36E=
=U6IQ
-----END PGP SIGNATURE-----

Login or Register to add favorites

File Archive:

November 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Nov 1st
    30 Files
  • 2
    Nov 2nd
    0 Files
  • 3
    Nov 3rd
    0 Files
  • 4
    Nov 4th
    12 Files
  • 5
    Nov 5th
    44 Files
  • 6
    Nov 6th
    18 Files
  • 7
    Nov 7th
    9 Files
  • 8
    Nov 8th
    8 Files
  • 9
    Nov 9th
    3 Files
  • 10
    Nov 10th
    0 Files
  • 11
    Nov 11th
    0 Files
  • 12
    Nov 12th
    0 Files
  • 13
    Nov 13th
    0 Files
  • 14
    Nov 14th
    0 Files
  • 15
    Nov 15th
    0 Files
  • 16
    Nov 16th
    0 Files
  • 17
    Nov 17th
    0 Files
  • 18
    Nov 18th
    0 Files
  • 19
    Nov 19th
    0 Files
  • 20
    Nov 20th
    0 Files
  • 21
    Nov 21st
    0 Files
  • 22
    Nov 22nd
    0 Files
  • 23
    Nov 23rd
    0 Files
  • 24
    Nov 24th
    0 Files
  • 25
    Nov 25th
    0 Files
  • 26
    Nov 26th
    0 Files
  • 27
    Nov 27th
    0 Files
  • 28
    Nov 28th
    0 Files
  • 29
    Nov 29th
    0 Files
  • 30
    Nov 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2024 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close