<<< Date Index >>>     <<< Thread Index >>>

Novell Security Announcement NOVELL-SA:2006:001



-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

________________________________________________________________________

                   Novell Security Announcement

Product Name:           Novell GroupWise
Announcement ID:        NOVELL-SA:2006:001
Date:                   Wed Jun 28 13:00:00 MDT 2006
Affected Products:      Novell GroupWise 5.x
                        Novell GroupWise 6.0
                        Novell GroupWise 6.5
                        Novell GroupWise 7
                        Novell GroupWise 32-bit Client
Vulnerability Type:     Unauthorized access to email
Severity (1-10):        8
Cross-References:       CVE-2006-3268

Content of This Advisory:
        1) Problem Description
        2) Solution or Work-Around
        3) Special Instructions and Notes
        4) Patch Location
        5) Authenticity Verification and Additional Information
        6) Disclaimer
        7) Novell Security Public Key


________________________________________________________________________

1) Problem Description and Brief Discussion

   A security vulnerability exists in the GroupWise Windows Client API
   that can allow random programmatic access to non-authorized email
   within the same authenticated post office.

2) Solution or Work-Around

   There is no known workaround.  Please follow the instructions below
   to install the patch.

   For GroupWise 7 - Customers running GroupWise 7.0 Windows Clients
   should immediately upgrade all Windows clients to GroupWise 7 SP1
   (dated 19 Jun 2006) and lock out older Windows clients via
   ConsoleOne.

   For GroupWise 6.5 - Customers running GroupWise 6.5.x Windows Clients
   should immediately upgrade all Windows clients to the GroupWise 6.5
   SP6 Client Update 1 (dated 27 Jun 2006), or upgrade to GroupWise 7
   SP1.  Older Windows clients must be locked out via ConsoleOne.

   For GroupWise 6.0 and previous - Customers still running unsupported
   GroupWise versions (5.x and 6) of the Windows Clients should
   immediately upgrade clients and servers to either GroupWise 6.5 SP6
   Update 1 or to GroupWise 7 SP1.  Older Windows clients must be
   locked out via ConsoleOne.
   
   If Blackberry Enterprise Server (BES) is installed in a GroupWise 7
   environment then make sure to lock out based on client date rather
   than client version, as the recommended BES configuration is still
   to use the GroupWise 6.5 client.  The recommended date should be
   June 13 2006 in order to ensure that the system is not vulnerable.

3) Special Instructions and Notes

   For instructions on locking out older client versions and other
   details please refer to Novell Support TID# 1480
   @ http://www.novell.com/support. (Check box to search by TID ID).
   
4) Patch Location

   GroupWise 6.5
   http://support.novell.com/filefinder/16963/index.html

   GroupWise 7
   http://support.novell.com/filefinder/20641/index.html


________________________________________________________________________

5) Authenticity Verification and Additional Information

  - Announcement authenticity verification:

    Novell security announcements are published via a mailing list and
    on a Novell web site.  The authenticity and integrity of a Novell
    security announcement is guaranteed by a cryptographic signature in
    each announcement.  All Novell security announcements are published
    with a valid signature.

    To verify the signature of the announcement, save it as text into a
    file and run the command

      gpg --verify <file>

    replacing <file> with the name of the file where you saved the
    announcement.  The output for a valid signature looks like:

      gpg: Signature made <DATE> using RSA key ID 6AE6EC98
      gpg: Good signature from "Novell Security (Primary Contact
      Address) <security@xxxxxxxxxx>"

    where <DATE> is replaced by the date the document was signed.

    If the Novell Security key is not contained in your key ring, you
    can import it from 
      http://support.novell.com/security-alerts/keypage.txt.
    The <security@xxxxxxxxxx> public key is also included below.

    To import the key, use the command

      gpg --import keypage.txt

  - Novell publishes security announcements to the mailing list
    security-alerts@xxxxxxxxxxxxxxxxx  Any interested party may
    subscribe at http://www.novell.com/company/subscribe/.

    Novell's security contact is security@xxxxxxxxxxx  

  - The information in this advisory may be distributed or reproduced,
    provided that the advisory is not modified in any way. In
    particular, the clear text signature should show proof of the
    authenticity of the text.
________________________________________________________________________

6) Disclaimer

    The content of this document is believed to be accurate at the time
    of publishing based on currently available information. However, the
    information is provided "AS IS" without any warranty or
    representation.  Your use of the document constitutes acceptance of
    this disclaimer.  Novell disclaims all warranties, express or
    implied, regarding this document, including the warranties of
    merchantability and fitness for a particular purpose. Novell is not
    liable for any direct, indirect, or consequential loss or damage
    arising from use of, or reliance on, this document or any security
    alert, even if Novell has been advised of the possibility of such
    damages and even if such damages are foreseeable.

________________________________________________________________________

7) Novell Security Public Key

Type Bits/KeyID      Date        User ID
pub  4096R/6AE6EC98 2006-04-25  Novell Security <security@xxxxxxxxxx>

- -----BEGIN PGP PUBLIC KEY BLOCK-----
Version: GnuPG v1.4.2.2 (MingW32)
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=h2ya
- -----END PGP PUBLIC KEY BLOCK-----

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.4 (GNU/Linux)

iQIVAwUBRKLIIC6BSUNq5uyYAQJqtw/+P/IHemCfiJr5NY8gbZJ/kTYpxlB1aQDv
nGPe+spwz37OBICo8P0yg//7eT6ismFF8TGZTRQf8pHi1nmx8b7XfuDiUpYTSIzO
MkRGcEjpNLmFX+wKjxdwjj37azxWmQkEJDP17fh6/sBKO/Husg8Z7sSglZZ78pIH
YynQeUBqMYOigHZlsUVpbSqErIH6hA5LpqCtW6/YV11CRUvg1pJEow8iuK5KrCYE
PslieQRuOQe6I0SMKs6cGm16b1tJ+hkATIn1d5T5VQ5bfylCQHxI2UAgKUBCgTzA
DStPffypZ1vbH0PriWOELdiNHBSWtwB7mTVt//hvatpws2PW2TQ6I9726+Zr0dBB
0QpYAWqL8p1pkTEpUzq9XRnFLPb4IQ7Lz9n3Bkba4VAGxu9HWbI7j7Y9RgR4wVXL
svR3AnJoKlL7z+8tJy/o7zU2r7kDGPDEsl+yjdcJPCbuwA6mSN/VVX5oA7zW8sEp
cOHiiFVU4uWDbh8XM9IP+xcbTR529ekrIJL7KVkqrm0LxIfHXHdBAd+EQxag010l
aCbxnrr+ilJry2PO2E+lgJI0lbGvWlGqnAYMARPuy1eI+QLT5D5utjiRo4C3li38
6KhlKGBN/HTEXoOKo7KfZN+GuxXrqwE2Jsu5f4K5fE/geDaDVrgE23l9NyGWEXl0
fIXbAAKD8Tk=
=5avL
-----END PGP SIGNATURE-----