{"vuid":"VU#726891","idnumber":"726891","name":"Novell Groupwise contains protocol implementation vulnerability allowing email to be viewed by unauthorized user","keywords":["Novell Groupwise","intercept email communications"],"overview":"Novell GroupWise is an email storage program. Email is encrypted when stored. Usernames and passwords can be acquired by sniffing communications between the client and server.","clean_desc":"In Novell GroupWise email is stored as encrypted data. Clients and servers operating in Live Remote or Smart Caching mode improperly set a flag. This allows an attacker sniffing communications between the client and server to acquire usernames and passwords. As a result, an attacker can read all email stored in the GroupWise system on an account by account basis. The following versions of the clients and servers are affected by a this vulnerability: GroupWise 5.5 Enhancement Pack\nGroupWise 5.5 Enhancement Pack SP1\nGroupWise 5.5 Enhancement Pack SP2\nGroupWise 5.5 Enhancement Pack SP3\nGroupWise 6 Client and server versions of GroupWise 5.5 and prior, and GroupWise 6 SP1 are not vulnerable. Novell has released technical details regarding this vulnerability.","impact":"Any user on the system can read all emails on that system on an acount by account basis.","resolution":"Novell has released a patch, available at http://support.novell.com/padlock. Both the client and server must have patches applied.","workarounds":"","sysaffected":"","thanks":"Our thanks to \"Zig Ziggler\" <ziglet@email.com> who reported this vulnerability to Novell and the CERT/CC.","author":"This document was written by Jason Rafail.","public":["http://www.securityfocus.com/bid/3189","http://support.novell.com/padlock/details.htm","http://support.novell.com/padlock"],"cveids":["CVE-2001-1231"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-08-15T13:56:58Z","publicdate":"2001-08-14T00:00:00Z","datefirstpublished":"2002-01-31T21:38:56Z","dateupdated":"2002-01-31T21:39:01Z","revision":10,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"20","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"10","cam_impact":"8","cam_easeofexploitation":"5","cam_attackeraccessrequired":"1","cam_scorecurrent":"0.1725","cam_scorecurrentwidelyknown":"0.1725","cam_scorecurrentwidelyknownexploited":"0.3225","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.1725,"vulnote":null}