fkie_cve-2011-0914
Vulnerability from fkie_nvd
Published
2011-02-08 22:00
Modified
2024-11-21 01:25
Severity ?
Summary
Integer signedness error in ndiiop.exe in the DIIOP implementation in the server in IBM Lotus Domino before 8.5.3 allows remote attackers to execute arbitrary code via a GIOP client request, leading to a heap-based buffer overflow.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:lotus_domino:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9E1BDAF-D628-4797-AC6F-5D3D6422A218", "versionEndIncluding": "8.5.2.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:4.6.1:*:*:*:*:*:*:*", "matchCriteriaId": "51C33E15-C92F-4F22-9593-EFFE9F033730", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:4.6.3:*:*:*:*:*:*:*", "matchCriteriaId": "5C91500D-E91E-4776-9F51-34E7EBB8F031", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:4.6.4:*:*:*:*:*:*:*", "matchCriteriaId": "F5441972-4038-4845-9B35-EF35C0053EB4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0:*:*:*:*:*:*:*", "matchCriteriaId": "3264F8E8-C40A-4C5C-BF2C-BD4690FE7EC4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "AF9513C4-3F02-4C32-AD91-C4A5941A5A5C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "E570AFE6-CEAF-4F6F-81D3-CFFAAA8D5109", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "CF6B527E-B1FE-41A3-A274-7BE2E893E6AE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "92B419CE-813B-42AA-9E06-2059F7DEE669", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.4a:*:*:*:*:*:*:*", "matchCriteriaId": "197E7E1C-D545-46FB-890F-B92AB9DA2B94", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "986B8670-2341-474D-8477-47627DF1ED02", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.6:*:*:*:*:*:*:*", "matchCriteriaId": "908E6F9A-FCE7-48C2-A307-057536944313", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.6a:*:*:*:*:*:*:*", "matchCriteriaId": "400521B9-F617-44A5-AF59-3D8DAE78067A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.7:*:*:*:*:*:*:*", "matchCriteriaId": "00D21AF1-5802-41DA-8812-43B251D55CE9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.7a:*:*:*:*:*:*:*", "matchCriteriaId": "78DCE051-78E2-4F35-9598-98C19110ECE2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.8:*:*:*:*:*:*:*", "matchCriteriaId": "A80A1E8B-43C8-449F-9B16-01F30D23E3D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.8a:*:*:*:*:*:*:*", "matchCriteriaId": "A5E9D813-6EDD-48A0-9A2D-E08207F25AB2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.9:*:*:*:*:*:*:*", "matchCriteriaId": "F49E352F-35C5-4C9A-9B3D-C8C6FC128B35", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.9a:*:*:*:*:*:*:*", "matchCriteriaId": "CC2A846C-20EC-41A6-BF4C-8FB84C45CEE4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.10:*:*:*:*:*:*:*", "matchCriteriaId": "2E0761E0-E899-413E-97CF-23BDA9395B15", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:5.0.11:*:*:*:*:*:*:*", "matchCriteriaId": "8471D114-204C-4B44-B0BE-C86226D8A5A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "A9989FEB-3B5E-40FF-BDBF-CFC835BCF93B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "B4B2AFF7-3921-402A-AE7A-BB9E2E8AA0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "2974F32F-19F1-42E5-AB4C-59ACC6D07ED5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "C4BF6EB6-8A21-4FFD-A15F-797824D0F515", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "B8A0BACA-DD1E-44AB-BF02-1F0DB179FF00", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "C1320064-F0E9-42C8-8E1C-9037684FA693", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "636FC0B6-8C7B-416E-9343-B6712C93D036", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "3FD364F0-EE5B-4082-AD87-C9769F492E0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.2_cf2:*:*:*:*:*:*:*", "matchCriteriaId": "64AB8494-6BC9-43CB-A645-43944B03D10A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "06DBE88F-F765-448E-88AF-3ED9FB98181A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "AE30DC2C-35E9-4E4E-A8FF-2A31CF28B6DF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C9EE627-6072-4359-981B-0168F7D44B7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "53D6F4E6-2C8A-40B6-9DB9-38E15D2AFEEF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.0:*:*:*:*:*:*:*", "matchCriteriaId": "0766C3F9-D2A2-4A58-9FF7-11B57232DEA0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "C00B8057-26DF-4064-A934-0AA88A0C1A6F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "8EFA5487-2D61-4E61-98A3-51882A8CE0C4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "D139E5E3-F66C-4184-9C4F-B06391147130", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "A95404CC-47B8-40C6-BCED-FC3E68CA8D8F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "B39B06CE-E38C-469B-8E24-87B26F3BEB65", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "8F342FD1-7A60-4E7D-B56A-E1C3D560C728", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFBB2FBE-9A0A-49C9-A281-4D053513016B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "D1B84127-574D-4C12-8823-787B1BBBAEA7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.4.3:*:*:*:*:*:*:*", "matchCriteriaId": "C7708DE5-A3C2-4024-B5AE-FC9DE963935F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "C709D66D-3AE7-48B7-9E27-5D1FE452643C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:6.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "FB5AE863-C29F-4D32-8845-2D2426085071", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "8FDDB5FD-9152-4A9C-829B-8BA2ACB3A5A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "A8A7AF44-125F-4760-8370-34B7B4CB8753", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "48E4A116-4FEF-4EAF-B4C4-F6096853F791", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "69495B18-39A4-443F-A724-F713C4DD14A2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "63DD600E-2405-4954-B4EC-218ED0CF2492", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "42C54057-4166-476B-A184-CD3F4844D0D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "A0224534-201F-428A-A2D8-2C957BF57149", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "A946E7EE-769E-4676-AA7A-97CDD9168A5E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.3.1:*:*:*:*:*:*:*", "matchCriteriaId": "4AA31957-2452-4992-8DDA-7DDAAD09EC1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "C8B5F961-7652-4967-BEEF-22F09484CDD7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.4.1:*:*:*:*:*:*:*", "matchCriteriaId": "23E14D9F-97E1-4DFA-994F-DF7F118BFFA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:7.0.4.2:*:*:*:*:*:*:*", "matchCriteriaId": "B09BFA8E-8F0F-4517-9F6A-B1097902324F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "CE8510F6-D054-488E-99E9-A58272C47AA3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "15DB2AF7-B494-4494-8686-33CB6A4C2CDC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.0.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "6FD6A3A3-6D6C-4EE0-B092-862DB03AC320", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.0.2.2:*:*:*:*:*:*:*", "matchCriteriaId": "1D2A467B-72FA-4280-A397-BC9D86D5B012", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.0.2.3:*:*:*:*:*:*:*", "matchCriteriaId": "D419EFAE-E03F-4F4A-8C18-06BE61EBBF5D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.0.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "F936FD55-AD59-47B3-8591-3F79B2ABB4E9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.0.2.5:*:*:*:*:*:*:*", "matchCriteriaId": "E2FDC12D-2B2F-4967-8863-95A0F5AC2F21", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.0.2.6:*:*:*:*:*:*:*", "matchCriteriaId": "E99A0A69-D443-469D-BDAB-F0250420C128", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "E0059358-69C1-4F89-B4E6-B6BE22845D33", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "ECF00AEE-9A3A-46E3-8B0F-2131E3235431", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "9861BE52-4945-4F36-B6EF-701DB789CA28", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D6BFA82-5CA0-403F-98E6-342EF87AE366", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "79CBA8AF-9C3D-4510-8D91-7C42931CD3FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "6DB694E3-96E1-4283-8DE3-91E930F76A65", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "05403BDA-56C0-465B-9669-19794DC7A7D0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.2.1:*:*:*:*:*:*:*", "matchCriteriaId": "91D7FA80-1FD9-48F3-934A-FC7B3BAD4FD6", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer signedness error in ndiiop.exe in the DIIOP implementation in the server in IBM Lotus Domino before 8.5.3 allows remote attackers to execute arbitrary code via a GIOP client request, leading to a heap-based buffer overflow." }, { "lang": "es", "value": "Error de presencia de signo (signedness) en enteros en ndiiop.exe en la aplicaci\u00f3n DIIOP en el servidor de IBM Lotus Domino v8.5.3 y anteriores, permite a atacantes remotos ejecutar c\u00f3digo se elecci\u00f3n mediante una petici\u00f3n del cliente GIOP, dando lugar a un desbordamiento de b\u00fafer en la memoria din\u00e1mica." } ], "id": "CVE-2011-0914", "lastModified": "2024-11-21T01:25:09.183", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 10.0, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 10.0, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2011-02-08T22:00:02.510", "references": [ { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/43208" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21461514" }, { "source": "cve@mitre.org", "url": "http://zerodayinitiative.com/advisories/ZDI-11-052/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/43208" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21461514" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://zerodayinitiative.com/advisories/ZDI-11-052/" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.