Vulnerability Details : CVE-2012-0439
Public exploit exists!
An ActiveX control in gwcls1.dll in the client in Novell GroupWise 8.0 before 8.0.3 HP2 and 2012 before SP1 HP1 allows remote attackers to execute arbitrary code via (1) a pointer argument to the SetEngine method or (2) an XPItem pointer argument to an unspecified method.
Vulnerability category: Execute code
Products affected by CVE-2012-0439
- cpe:2.3:a:novell:groupwise:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:8.00:hp1:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:8.00:hp2:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:8.02:hp2:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:8.02:hp3:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:8.03:*:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:8.01:*:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:8.01:hp:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:8.02:*:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:8.02:hp1:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:2012:*:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:8.00:hp3:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:8.03:hp1:*:*:*:*:*:*
- cpe:2.3:a:novell:groupwise:2012:sp1:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2012-0439
96.80%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 100 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2012-0439
-
Novell GroupWise Client gwcls1.dll ActiveX Remote Code Execution
Disclosure Date: 2013-01-30First seen: 2020-04-26exploit/windows/browser/novell_groupwise_gwcls1_actvxThis module exploits a vulnerability in the Novell GroupWise Client gwcls1.dll ActiveX. Several methods in the GWCalServer control use user provided data as a pointer, which allows to read arbitrary memory and execute arbitrary code. This module has been tested suc
CVSS scores for CVE-2012-0439
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2012-0439
-
The product constructs all or part of a code segment using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the syntax or behavior of the intended code segment.Assigned by: nvd@nist.gov (Primary)
References for CVE-2012-0439
-
http://www.novell.com/support/kb/doc.php?id=7011688
Security Vulnerability: GroupWise Client for Windows ActiveX Control VulnerabilityVendor Advisory
-
https://bugzilla.novell.com/show_bug.cgi?id=743674
Access Denied
-
https://bugzilla.novell.com/show_bug.cgi?id=712144
Access Denied
-
http://www.zerodayinitiative.com/advisories/ZDI-13-008/
ZDI-13-008 | Zero Day Initiative
Jump to