search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Groove Virtual Office COM objects may be accessed insecurely

Vulnerability Note VU#155610

Original Release Date: 2005-05-19 | Last Revised: 2005-06-14

Overview

Groove Virtual Office may allow access restrictions on COM objects to be bypassed. Exploitation may allow an attacker to execute arbitrary code.

Description

Groove Virtual Office provides a collaborative working environment that includes shared documents, databases, and various other tools to facilitate communication and productivity. The Microsoft Component Object Model (COM) provides a means for communication among objects in a Windows environment. Groove Virtual Office uses many COM objects to perform a variety of tasks. A vulnerability exists in Groove that may allow an attacker to bypass Groove's security restrictions and arbitrarily use a COM object's services, such as script execution.

Please note that if the access restrictions of a COM object that allows remote access are compromised, that object may be exploited remotely.

Impact

The impact of exploitation depends on the COM object being attacked. Potential consequences may include the remote execution of arbitrary scripting code, a denial-of-service condition, and the disclosure of sensitive information.

Solution

Update

This vulnerability is addressed in Groove Virtual Office 3.1 build 2338, 3.1a build 2364, and Groove Workspace Version 2.5n build 1871. These updates are available from

http://www.groove.net/update

and

http://www.groove.net/archive.

Vendor Information

155610
 

CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

This vulnerability was reported by US-CERT.

This document was written by Jeff Gennari.

Other Information

CVE IDs: None
Severity Metric: 1.87
Date Public: 2005-05-19
Date First Published: 2005-05-19
Date Last Updated: 2005-06-14 15:50 UTC
Document Revision: 89

Sponsored by CISA.