{"vuid":"VU#155610","idnumber":"155610","name":"Groove Virtual Office COM objects may be accessed insecurely","keywords":["Groove Virtual Office","COM Objects","scripting"],"overview":"Groove Virtual Office may allow access restrictions on COM objects to be bypassed. Exploitation may allow an attacker to execute arbitrary code.","clean_desc":"Groove Virtual Office provides a collaborative working environment that includes shared documents, databases, and various other tools to facilitate communication and productivity. The Microsoft Component Object Model (COM) provides a means for communication among objects in a Windows environment. Groove Virtual Office uses many COM objects to perform a variety of tasks. A vulnerability exists in Groove that may allow an attacker to bypass Groove's security restrictions and arbitrarily use a COM object's services, such as script execution. Please note that if the access restrictions of a COM object that allows remote access are compromised, that object may be exploited remotely.","impact":"The impact of exploitation depends on the COM object being attacked. Potential consequences may include the remote execution of arbitrary scripting code, a denial-of-service condition, and the disclosure of sensitive information.","resolution":"Update\nThis vulnerability is addressed in Groove Virtual Office 3.1 build 2338, 3.1a build 2364, and Groove Workspace Version 2.5n build 1871. These updates are available from http://www.groove.net/update and http://www.groove.net/archive.","workarounds":"","sysaffected":"","thanks":"This vulnerability was reported by US-CERT.","author":"This document was written by Jeff Gennari.","public":["http://www.groove.net","http://www.groove.net/index.cfm?pagename=Support_Overview","http://www.groove.net/update","http://www.groove.net/archive","http://www.securitytracker.com/id?1014019","http://www.securityfocus.com/bid/13685"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2005-04-07T18:15:33Z","publicdate":"2005-05-19T00:00:00Z","datefirstpublished":"2005-05-19T15:29:29Z","dateupdated":"2005-06-14T15:50:09Z","revision":89,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"5","cam_exploitation":"0","cam_internetinfrastructure":"3","cam_population":"15","cam_impact":"17","cam_easeofexploitation":"7","cam_attackeraccessrequired":"7","cam_scorecurrent":"1.87425","cam_scorecurrentwidelyknown":"5.38846875","cam_scorecurrentwidelyknownexploited":"10.07409375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":1.87425,"vulnote":null}