CVE-2012-0439
Novell GroupWise <8.0.3-2012.SP1 - RCE
Title source: llmDescription
An ActiveX control in gwcls1.dll in the client in Novell GroupWise 8.0 before 8.0.3 HP2 and 2012 before SP1 HP1 allows remote attackers to execute arbitrary code via (1) a pointer argument to the SetEngine method or (2) an XPItem pointer argument to an unspecified method.
Exploits (2)
exploitdb
WORKING POC
VERIFIED
by Metasploit · rubyremotewindows
https://www.exploit-db.com/exploits/24490
metasploit
WORKING POC
NORMAL
rubypocwin
https://github.com/rapid7/metasploit-framework/blob/master/modules/exploits/windows/browser/novell_groupwise_gwcls1_actvx.rb
Scores
EPSS
0.6830
EPSS Percentile
98.6%
Details
CWE
CWE-94
Status
published
Products (6)
novell/groupwise
8.0
novell/groupwise
8.00 hp1 (3 CPE variants)
novell/groupwise
8.01 (2 CPE variants)
novell/groupwise
8.02 (4 CPE variants)
novell/groupwise
8.03 (2 CPE variants)
novell/groupwise
2012 (2 CPE variants)
Published
Feb 24, 2013
Tracked Since
Feb 18, 2026