fkie_cve-2020-14230
Vulnerability from fkie_nvd
Published
2020-11-21 18:15
Modified
2024-11-21 05:02
Summary
HCL Domino is susceptible to a Denial of Service vulnerability caused by improper validation of user-supplied input. A remote unauthenticated attacker could exploit this vulnerability using a specially-crafted email message to hang the server. Versions previous to releases 9.0.1 FP10 IF6, 10.0.1 FP5 and 11.0.1 are affected.
Impacted products
Vendor Product Version
hcltech domino *
hcltech domino *
hcltech domino *
hcltech domino 9.0.1
hcltech domino 9.0.1
hcltech domino 9.0.1
hcltech domino 9.0.1
hcltech domino 9.0.1
hcltech domino 9.0.1
hcltech domino 9.0.1
hcltech domino 10.0.1
hcltech domino 10.0.1
hcltech domino 10.0.1
hcltech domino 10.0.1
hcltech domino 10.0.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:hcltech:domino:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "EA96995E-99EC-4260-A329-B4137AFBEB6B",
              "versionEndExcluding": "9.0.1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "4CB117EF-6AE5-4323-9ACF-01DE2C92182D",
              "versionEndExcluding": "10.0.1",
              "versionStartIncluding": "10.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C31C2D72-DD61-4772-8D9D-CE239FBDE6CF",
              "versionEndExcluding": "11.0.1",
              "versionStartIncluding": "11.0.0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "4E0BF886-B732-4210-82AA-4D2B3F77132B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_10_interim_fix_3:*:*:*:*:*:*",
              "matchCriteriaId": "2D00AC8D-4E35-49F4-B0EE-C03E1EE67B8E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_10_interim_fix_4:*:*:*:*:*:*",
              "matchCriteriaId": "0FBD1792-01BA-402A-859E-531F7614C9A2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8:*:*:*:*:*:*",
              "matchCriteriaId": "F3D799A2-AC87-43E8-A6A2-E76E1535A7C4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8_interim_fix_1:*:*:*:*:*:*",
              "matchCriteriaId": "9C9A93C4-70E8-472D-A038-14F72780E02F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8_interim_fix_2:*:*:*:*:*:*",
              "matchCriteriaId": "442C02A0-0232-488A-8A66-62386FFBC807",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8_interim_fix_3:*:*:*:*:*:*",
              "matchCriteriaId": "A349B3BD-CB3D-4290-BE9E-8FFA68C3512B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:-:*:*:*:*:*:*",
              "matchCriteriaId": "EC5EB2B8-9B48-4E9B-9726-71E4A6CCFA99",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fix_pack_1:*:*:*:*:*:*",
              "matchCriteriaId": "10824FE5-1BCB-422A-8EFD-AE170C78FB43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fix_pack_2:*:*:*:*:*:*",
              "matchCriteriaId": "985D72C3-3149-4DC1-85FA-C681CF779050",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fix_pack_3:*:*:*:*:*:*",
              "matchCriteriaId": "8688C462-C24D-4E68-B2A1-488E20396DE5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:hcltech:domino:10.0.1:fix_pack_4:*:*:*:*:*:*",
              "matchCriteriaId": "64D65B08-CAB2-4FC5-9261-4303EF796BCF",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "HCL Domino is susceptible to a Denial of Service vulnerability caused by improper validation of user-supplied input. A remote unauthenticated attacker could exploit this vulnerability using a specially-crafted email message to hang the server. Versions previous to releases 9.0.1 FP10 IF6, 10.0.1 FP5 and 11.0.1 are affected."
    },
    {
      "lang": "es",
      "value": "HCL Domino es susceptible a una vulnerabilidad de Denegaci\u00f3n de Servicio causada por una comprobaci\u00f3n inapropiada de la entrada suministrada por el usuario.\u0026#xa0;Un atacante remoto no autenticado podr\u00eda explotar esta vulnerabilidad mediante un mensaje de correo electr\u00f3nico especialmente dise\u00f1ado para bloquear el servidor.\u0026#xa0;Las versiones anteriores a las versiones 9.0.1 FP10 IF6, 10.0.1 FP5 y 11.0.1 est\u00e1n afectadas"
    }
  ],
  "id": "CVE-2020-14230",
  "lastModified": "2024-11-21T05:02:53.897",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ],
    "cvssMetricV31": [
      {
        "cvssData": {
          "attackComplexity": "LOW",
          "attackVector": "NETWORK",
          "availabilityImpact": "HIGH",
          "baseScore": 7.5,
          "baseSeverity": "HIGH",
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "privilegesRequired": "NONE",
          "scope": "UNCHANGED",
          "userInteraction": "NONE",
          "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H",
          "version": "3.1"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 3.6,
        "source": "nvd@nist.gov",
        "type": "Primary"
      }
    ]
  },
  "published": "2020-11-21T18:15:11.620",
  "references": [
    {
      "source": "psirt@hcl.com",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0085303"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "https://support.hcltechsw.com/csm?id=kb_article\u0026sysparm_article=KB0085303"
    }
  ],
  "sourceIdentifier": "psirt@hcl.com",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-20"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.