Vulnerabilites related to ibm - notes
CVE-2017-1720 (GCVE-0-2017-1720)
Vulnerability from cvelistv5
Published
2018-02-13 20:00
Modified
2024-09-16 22:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Gain Privileges
Summary
IBM Notes 8.5 and 9.0 could allow a local attacker to execute arbitrary commands by carefully crafting a command line sent via the shared memory IPC. IBM X-Force ID: 134807.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | IBM | Client Application Access |
Version: 1.0.0.1 Version: 1.0.1 Version: 1.0.1.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:39:32.300Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134807" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Client Application Access", "vendor": "IBM", "versions": [ { "status": "affected", "version": "1.0.0.1" }, { "status": "affected", "version": "1.0.1" }, { "status": "affected", "version": "1.0.1.2" } ] }, { "product": "Notes", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.5.3.6" }, { "status": "affected", "version": "8.5.1.5" }, { "status": "affected", "version": "8.5.2.4" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.0.1.9" } ] } ], "datePublic": "2018-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Notes 8.5 and 9.0 could allow a local attacker to execute arbitrary commands by carefully crafting a command line sent via the shared memory IPC. IBM X-Force ID: 134807." } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-13T19:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134807" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-02-08T00:00:00", "ID": "CVE-2017-1720", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Client Application Access", "version": { "version_data": [ { "version_value": "1.0.0.1" }, { "version_value": "1.0.1" }, { "version_value": "1.0.1.2" } ] } }, { "product_name": "Notes", "version": { "version_data": [ { "version_value": "8.5.3.6" }, { "version_value": "8.5.1.5" }, { "version_value": "8.5.2.4" }, { "version_value": "9.0" }, { "version_value": "9.0.1.9" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Notes 8.5 and 9.0 could allow a local attacker to execute arbitrary commands by carefully crafting a command line sent via the shared memory IPC. IBM X-Force ID: 134807." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134807", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134807" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010766", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010767", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2017-1720", "datePublished": "2018-02-13T20:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-16T22:20:55.622Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-1410 (GCVE-0-2018-1410)
Vulnerability from cvelistv5
Published
2018-02-19 14:00
Modified
2024-09-16 17:23
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Gain Privileges
Summary
IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138709.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | IBM | Client Application Access |
Version: 1.0.0.1 Version: 1.0.1 Version: 1.0.1.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:59:38.992Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138709" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Client Application Access", "vendor": "IBM", "versions": [ { "status": "affected", "version": "1.0.0.1" }, { "status": "affected", "version": "1.0.1" }, { "status": "affected", "version": "1.0.1.2" } ] }, { "product": "Notes", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.5.3.6" }, { "status": "affected", "version": "8.5.1.5" }, { "status": "affected", "version": "8.5.2.4" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.0.1.9" } ] } ], "datePublic": "2018-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138709." } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-19T13:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138709" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-02-13T00:00:00", "ID": "CVE-2018-1410", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Client Application Access", "version": { "version_data": [ { "version_value": "1.0.0.1" }, { "version_value": "1.0.1" }, { "version_value": "1.0.1.2" } ] } }, { "product_name": "Notes", "version": { "version_data": [ { "version_value": "8.5.3.6" }, { "version_value": "8.5.1.5" }, { "version_value": "8.5.2.4" }, { "version_value": "9.0" }, { "version_value": "9.0.1.9" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138709." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138709", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138709" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010766", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010767", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1410", "datePublished": "2018-02-19T14:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-16T17:23:55.401Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2012-6277 (GCVE-0-2012-6277)
Vulnerability from cvelistv5
Published
2020-02-21 16:50
Modified
2024-08-06 21:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Other
Summary
Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8.5.x, IBM Lotus Domino 8.5.x before 8.5.3 FP4, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, related to "a number of underlying issues" in which "some of these cases demonstrated memory corruption with attacker-controlled input and could be exploited to run arbitrary code."
References
► | URL | Tags | ||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
n/a | Autonomy KeyView IDOL |
Version: before 10.16 |
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T21:28:39.605Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://support.symantec.com/us/en/article.symsa1262.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-addressed-in-ibm-notes-9-0-cve-2011-3026-cve-2012-6349-cve-2012-6277/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.kb.cert.org/vuls/id/849841/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://vulmon.com/vulnerabilitydetails?qid=CVE-2012-6277" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.tenable.com/plugins/nessus/67192" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=27482" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.securityfocus.com/bid/56610" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://www.energy.gov/cio/articles/v-118-ibm-lotus-domino-multiple-vulnerabilities" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Autonomy KeyView IDOL", "vendor": "n/a", "versions": [ { "status": "affected", "version": "before 10.16" } ] } ], "datePublic": "2012-11-20T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8.5.x, IBM Lotus Domino 8.5.x before 8.5.3 FP4, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, related to \"a number of underlying issues\" in which \"some of these cases demonstrated memory corruption with attacker-controlled input and could be exploited to run arbitrary code.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "Other", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-02-21T16:50:17", "orgId": "37e5125f-f79b-445b-8fad-9564f167944b", "shortName": "certcc" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://support.symantec.com/us/en/article.symsa1262.html" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-addressed-in-ibm-notes-9-0-cve-2011-3026-cve-2012-6349-cve-2012-6277/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.kb.cert.org/vuls/id/849841/" }, { "tags": [ "x_refsource_MISC" ], "url": "https://vulmon.com/vulnerabilitydetails?qid=CVE-2012-6277" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.tenable.com/plugins/nessus/67192" }, { "tags": [ "x_refsource_MISC" ], "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=27482" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.securityfocus.com/bid/56610" }, { "tags": [ "x_refsource_MISC" ], "url": "https://www.energy.gov/cio/articles/v-118-ibm-lotus-domino-multiple-vulnerabilities" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cert@cert.org", "ID": "CVE-2012-6277", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Autonomy KeyView IDOL", "version": { "version_data": [ { "version_value": "before 10.16" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8.5.x, IBM Lotus Domino 8.5.x before 8.5.3 FP4, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, related to \"a number of underlying issues\" in which \"some of these cases demonstrated memory corruption with attacker-controlled input and could be exploited to run arbitrary code.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Other" } ] } ] }, "references": { "reference_data": [ { "name": "https://support.symantec.com/us/en/article.symsa1262.html", "refsource": "MISC", "url": "https://support.symantec.com/us/en/article.symsa1262.html" }, { "name": "https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-addressed-in-ibm-notes-9-0-cve-2011-3026-cve-2012-6349-cve-2012-6277/", "refsource": "MISC", "url": "https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-addressed-in-ibm-notes-9-0-cve-2011-3026-cve-2012-6349-cve-2012-6277/" }, { "name": "https://www.kb.cert.org/vuls/id/849841/", "refsource": "MISC", "url": "https://www.kb.cert.org/vuls/id/849841/" }, { "name": "https://vulmon.com/vulnerabilitydetails?qid=CVE-2012-6277", "refsource": "MISC", "url": "https://vulmon.com/vulnerabilitydetails?qid=CVE-2012-6277" }, { "name": "https://www.tenable.com/plugins/nessus/67192", "refsource": "MISC", "url": "https://www.tenable.com/plugins/nessus/67192" }, { "name": "https://tools.cisco.com/security/center/viewAlert.x?alertId=27482", "refsource": "MISC", "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=27482" }, { "name": "https://www.securityfocus.com/bid/56610", "refsource": "MISC", "url": "https://www.securityfocus.com/bid/56610" }, { "name": "https://www.energy.gov/cio/articles/v-118-ibm-lotus-domino-multiple-vulnerabilities", "refsource": "MISC", "url": "https://www.energy.gov/cio/articles/v-118-ibm-lotus-domino-multiple-vulnerabilities" } ] } } } }, "cveMetadata": { "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b", "assignerShortName": "certcc", "cveId": "CVE-2012-6277", "datePublished": "2020-02-21T16:50:17", "dateReserved": "2012-12-06T00:00:00", "dateUpdated": "2024-08-06T21:28:39.605Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-1714 (GCVE-0-2017-1714)
Vulnerability from cvelistv5
Published
2018-02-13 20:00
Modified
2024-09-17 02:56
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Gain Privileges
Summary
IBM Notes and Domino NSD 8.5 and 9.0 could allow an authenticated local user without administrative privileges to gain System privilege. IBM X-Force ID: 134633.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | IBM | Client Application Access |
Version: 1.0.0.1 Version: 1.0.1.1 Version: 1.0.1.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:39:32.165Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010777" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134633" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010776" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Client Application Access", "vendor": "IBM", "versions": [ { "status": "affected", "version": "1.0.0.1" }, { "status": "affected", "version": "1.0.1.1" }, { "status": "affected", "version": "1.0.1.2" } ] }, { "product": "Notes", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.5.3.6" }, { "status": "affected", "version": "8.5.1.5" }, { "status": "affected", "version": "8.5.2.4" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.0.1.9" } ] } ], "datePublic": "2018-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Notes and Domino NSD 8.5 and 9.0 could allow an authenticated local user without administrative privileges to gain System privilege. IBM X-Force ID: 134633." } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-15T14:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010777" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134633" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010776" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-02-08T00:00:00", "ID": "CVE-2017-1714", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Client Application Access", "version": { "version_data": [ { "version_value": "1.0.0.1" }, { "version_value": "1.0.1.1" }, { "version_value": "1.0.1.2" } ] } }, { "product_name": "Notes", "version": { "version_data": [ { "version_value": "8.5.3.6" }, { "version_value": "8.5.1.5" }, { "version_value": "8.5.2.4" }, { "version_value": "9.0" }, { "version_value": "9.0.1.9" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Notes and Domino NSD 8.5 and 9.0 could allow an authenticated local user without administrative privileges to gain System privilege. IBM X-Force ID: 134633." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010777", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010777" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134633", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134633" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010776", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010776" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2017-1714", "datePublished": "2018-02-13T20:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-17T02:56:31.561Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-17689 (GCVE-0-2017-17689)
Vulnerability from cvelistv5
Published
2018-05-16 19:00
Modified
2024-08-05 20:59
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
References
► | URL | Tags | ||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T20:59:17.441Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://news.ycombinator.com/item?id=17066419" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://pastebin.com/gNCc8aYm" }, { "name": "104165", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/104165" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://twitter.com/matthew_d_green/status/996371541591019520" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://efail.de" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.synology.com/support/security/Synology_SA_18_22" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2018-05-16T00:00:00", "descriptions": [ { "lang": "en", "value": "The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-05-17T09:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://news.ycombinator.com/item?id=17066419" }, { "tags": [ "x_refsource_MISC" ], "url": "https://pastebin.com/gNCc8aYm" }, { "name": "104165", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/104165" }, { "tags": [ "x_refsource_MISC" ], "url": "https://twitter.com/matthew_d_green/status/996371541591019520" }, { "tags": [ "x_refsource_MISC" ], "url": "https://efail.de" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.synology.com/support/security/Synology_SA_18_22" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2017-17689", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "https://news.ycombinator.com/item?id=17066419", "refsource": "MISC", "url": "https://news.ycombinator.com/item?id=17066419" }, { "name": "https://pastebin.com/gNCc8aYm", "refsource": "MISC", "url": "https://pastebin.com/gNCc8aYm" }, { "name": "104165", "refsource": "BID", "url": "http://www.securityfocus.com/bid/104165" }, { "name": "https://twitter.com/matthew_d_green/status/996371541591019520", "refsource": "MISC", "url": "https://twitter.com/matthew_d_green/status/996371541591019520" }, { "name": "https://efail.de", "refsource": "MISC", "url": "https://efail.de" }, { "name": "https://www.synology.com/support/security/Synology_SA_18_22", "refsource": "CONFIRM", "url": "https://www.synology.com/support/security/Synology_SA_18_22" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2017-17689", "datePublished": "2018-05-16T19:00:00", "dateReserved": "2017-12-15T00:00:00", "dateUpdated": "2024-08-05T20:59:17.441Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2016-0270 (GCVE-0-2016-0270)
Vulnerability from cvelistv5
Published
2017-02-08 16:00
Modified
2024-08-05 22:15
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
IBM Domino 9.0.1 Fix Pack 3 Interim Fix 2 through 9.0.1 Fix Pack 5 Interim Fix 1, when using TLS and AES GCM, uses random nonce generation, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack." NOTE: this CVE has been incorrectly used for GCM nonce reuse issues in other products; see CVE-2016-10213 for the A10 issue, CVE-2016-10212 for the Radware issue, and CVE-2017-5933 for the Citrix issue.
References
► | URL | Tags | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T22:15:23.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "96062", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/96062" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979604" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://github.com/nonce-disrespect/nonce-disrespect" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979673" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://support.citrix.com/article/CTX220329" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979669" }, { "name": "1037795", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1037795" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2016-03-28T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Domino 9.0.1 Fix Pack 3 Interim Fix 2 through 9.0.1 Fix Pack 5 Interim Fix 1, when using TLS and AES GCM, uses random nonce generation, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a \"forbidden attack.\" NOTE: this CVE has been incorrectly used for GCM nonce reuse issues in other products; see CVE-2016-10213 for the A10 issue, CVE-2016-10212 for the Radware issue, and CVE-2017-5933 for the Citrix issue." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-11-14T10:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "96062", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/96062" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979604" }, { "tags": [ "x_refsource_MISC" ], "url": "https://github.com/nonce-disrespect/nonce-disrespect" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979673" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://support.citrix.com/article/CTX220329" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979669" }, { "name": "1037795", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1037795" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "ID": "CVE-2016-0270", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Domino 9.0.1 Fix Pack 3 Interim Fix 2 through 9.0.1 Fix Pack 5 Interim Fix 1, when using TLS and AES GCM, uses random nonce generation, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a \"forbidden attack.\" NOTE: this CVE has been incorrectly used for GCM nonce reuse issues in other products; see CVE-2016-10213 for the A10 issue, CVE-2016-10212 for the Radware issue, and CVE-2017-5933 for the Citrix issue." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "96062", "refsource": "BID", "url": "http://www.securityfocus.com/bid/96062" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21979604", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979604" }, { "name": "https://github.com/nonce-disrespect/nonce-disrespect", "refsource": "MISC", "url": "https://github.com/nonce-disrespect/nonce-disrespect" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21979673", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979673" }, { "name": "https://support.citrix.com/article/CTX220329", "refsource": "CONFIRM", "url": "https://support.citrix.com/article/CTX220329" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21979669", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979669" }, { "name": "1037795", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1037795" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2016-0270", "datePublished": "2017-02-08T16:00:00", "dateReserved": "2015-12-08T00:00:00", "dateUpdated": "2024-08-05T22:15:23.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-1437 (GCVE-0-2018-1437)
Vulnerability from cvelistv5
Published
2018-03-14 00:00
Modified
2024-09-16 19:46
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Gain Privileges
Summary
IBM Notes 8.5 and 9.0 could allow an attacker to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. A local attacker could exploit this vulnerability to DLL hijacking to execute arbitrary code on the system or cause the application to crash. IBM X-Force ID: 139565.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:59:39.026Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22014201" }, { "name": "103401", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103401" }, { "name": "ibm-notes-cve20181437-code-exec(139565)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139565" }, { "name": "1040563", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040563" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Notes", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.5.3.6" }, { "status": "affected", "version": "8.5" }, { "status": "affected", "version": "8.5.1" }, { "status": "affected", "version": "8.5.1.5" }, { "status": "affected", "version": "8.5.2" }, { "status": "affected", "version": "8.5.2.4" }, { "status": "affected", "version": "8.5.3" }, { "status": "affected", "version": "9.0.1" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "8.5.0.2" }, { "status": "affected", "version": "9.0.1.9" } ] } ], "datePublic": "2018-03-08T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Notes 8.5 and 9.0 could allow an attacker to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. A local attacker could exploit this vulnerability to DLL hijacking to execute arbitrary code on the system or cause the application to crash. IBM X-Force ID: 139565." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/A:H/AC:L/AV:L/C:H/I:H/PR:N/S:U/UI:R", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-07T09:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22014201" }, { "name": "103401", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103401" }, { "name": "ibm-notes-cve20181437-code-exec(139565)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139565" }, { "name": "1040563", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040563" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-03-08T00:00:00", "ID": "CVE-2018-1437", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Notes", "version": { "version_data": [ { "version_value": "8.5.3.6" }, { "version_value": "8.5" }, { "version_value": "8.5.1" }, { "version_value": "8.5.1.5" }, { "version_value": "8.5.2" }, { "version_value": "8.5.2.4" }, { "version_value": "8.5.3" }, { "version_value": "9.0.1" }, { "version_value": "9.0" }, { "version_value": "8.5.0.2" }, { "version_value": "9.0.1.9" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Notes 8.5 and 9.0 could allow an attacker to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. A local attacker could exploit this vulnerability to DLL hijacking to execute arbitrary code on the system or cause the application to crash. IBM X-Force ID: 139565." } ] }, "impact": { "cvssv3": { "BM": { "A": "H", "AC": "L", "AV": "L", "C": "H", "I": "H", "PR": "N", "S": "U", "UI": "R" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=swg22014201", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22014201" }, { "name": "103401", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103401" }, { "name": "ibm-notes-cve20181437-code-exec(139565)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139565" }, { "name": "1040563", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040563" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1437", "datePublished": "2018-03-14T00:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-16T19:46:06.111Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-1129 (GCVE-0-2017-1129)
Vulnerability from cvelistv5
Published
2017-09-05 21:00
Modified
2024-09-16 16:38
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service
Summary
IBM Notes 8.5 and 9.0 is vulnerable to a denial of service. If a user is persuaded to click on a malicious link, it could cause the Notes client to hang and have to be restarted. IBM X-Force ID: 121370.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | IBM | Lotus Expeditor |
Version: 6.2.1 Version: 6.2.2 Version: 6.2.3 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:25:17.474Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "42602", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42602/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21999385" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/121370" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22002103" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Lotus Expeditor", "vendor": "IBM", "versions": [ { "status": "affected", "version": "6.2.1" }, { "status": "affected", "version": "6.2.2" }, { "status": "affected", "version": "6.2.3" } ] }, { "product": "Notes", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.5.3.6" }, { "status": "affected", "version": "8.5.1.5" }, { "status": "affected", "version": "8.5.2.4" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.0.1.8" } ] } ], "datePublic": "2017-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Notes 8.5 and 9.0 is vulnerable to a denial of service. If a user is persuaded to click on a malicious link, it could cause the Notes client to hang and have to be restarted. IBM X-Force ID: 121370." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-06T09:57:02", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "42602", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42602/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21999385" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/121370" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22002103" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2017-08-31T00:00:00", "ID": "CVE-2017-1129", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Lotus Expeditor", "version": { "version_data": [ { "version_value": "6.2.1" }, { "version_value": "6.2.2" }, { "version_value": "6.2.3" } ] } }, { "product_name": "Notes", "version": { "version_data": [ { "version_value": "8.5.3.6" }, { "version_value": "8.5.1.5" }, { "version_value": "8.5.2.4" }, { "version_value": "9.0" }, { "version_value": "9.0.1.8" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Notes 8.5 and 9.0 is vulnerable to a denial of service. If a user is persuaded to click on a malicious link, it could cause the Notes client to hang and have to be restarted. IBM X-Force ID: 121370." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "42602", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42602/" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21999385", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg21999385" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/121370", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/121370" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22002103", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22002103" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2017-1129", "datePublished": "2017-09-05T21:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-16T16:38:43.778Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-1411 (GCVE-0-2018-1411)
Vulnerability from cvelistv5
Published
2018-02-19 14:00
Modified
2024-09-17 01:51
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Gain Privileges
Summary
IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138710.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | IBM | Client Application Access |
Version: 1.0.0.1 Version: 1.0.1 Version: 1.0.1.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:59:39.069Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138710" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Client Application Access", "vendor": "IBM", "versions": [ { "status": "affected", "version": "1.0.0.1" }, { "status": "affected", "version": "1.0.1" }, { "status": "affected", "version": "1.0.1.2" } ] }, { "product": "Notes", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.5.3.6" }, { "status": "affected", "version": "8.5.1.5" }, { "status": "affected", "version": "8.5.2.4" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.0.1.9" } ] } ], "datePublic": "2018-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138710." } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-19T13:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138710" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-02-13T00:00:00", "ID": "CVE-2018-1411", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Client Application Access", "version": { "version_data": [ { "version_value": "1.0.0.1" }, { "version_value": "1.0.1" }, { "version_value": "1.0.1.2" } ] } }, { "product_name": "Notes", "version": { "version_data": [ { "version_value": "8.5.3.6" }, { "version_value": "8.5.1.5" }, { "version_value": "8.5.2.4" }, { "version_value": "9.0" }, { "version_value": "9.0.1.9" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138710." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138710", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138710" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010766", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010767", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1411", "datePublished": "2018-02-19T14:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-17T01:51:25.769Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-1771 (GCVE-0-2018-1771)
Vulnerability from cvelistv5
Published
2018-12-20 14:00
Modified
2024-09-17 03:02
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Gain Privileges
Summary
IBM Domino 9.0 and 9.0.1 could allow an attacker to execute commands on the system by triggering a buffer overflow in the parsing of command line arguments passed to nsd.exe. IBM X-force ID: 148687.
References
► | URL | Tags | ||||||
---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T04:07:44.302Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ibm-notes-cve20181771-priv-escalation(148687)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/148687" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://www.ibm.com/support/docview.wss?uid=ibm10743405" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Domino", "vendor": "IBM", "versions": [ { "status": "affected", "version": "9.0.1" }, { "status": "affected", "version": "9.0" } ] } ], "datePublic": "2018-12-18T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Domino 9.0 and 9.0.1 could allow an attacker to execute commands on the system by triggering a buffer overflow in the parsing of command line arguments passed to nsd.exe. IBM X-force ID: 148687." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "exploitCodeMaturity": "UNPROVEN", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "remediationLevel": "OFFICIAL_FIX", "reportConfidence": "CONFIRMED", "scope": "UNCHANGED", "temporalScore": 7.3, "temporalSeverity": "HIGH", "userInteraction": "NONE", "vectorString": "CVSS:3.0/A:H/AC:L/AV:L/C:H/I:H/PR:N/S:U/UI:N/E:U/RC:C/RL:O", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-12-20T13:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "ibm-notes-cve20181771-priv-escalation(148687)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/148687" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://www.ibm.com/support/docview.wss?uid=ibm10743405" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-12-18T00:00:00", "ID": "CVE-2018-1771", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Domino", "version": { "version_data": [ { "version_value": "9.0.1" }, { "version_value": "9.0" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Domino 9.0 and 9.0.1 could allow an attacker to execute commands on the system by triggering a buffer overflow in the parsing of command line arguments passed to nsd.exe. IBM X-force ID: 148687." } ] }, "impact": { "cvssv3": { "BM": { "A": "H", "AC": "L", "AV": "L", "C": "H", "I": "H", "PR": "N", "S": "U", "UI": "N" }, "TM": { "E": "U", "RC": "C", "RL": "O" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "ibm-notes-cve20181771-priv-escalation(148687)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/148687" }, { "name": "https://www.ibm.com/support/docview.wss?uid=ibm10743405", "refsource": "CONFIRM", "url": "https://www.ibm.com/support/docview.wss?uid=ibm10743405" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1771", "datePublished": "2018-12-20T14:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-17T03:02:20.079Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-1130 (GCVE-0-2017-1130)
Vulnerability from cvelistv5
Published
2017-09-05 21:00
Modified
2024-09-16 21:58
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Denial of Service
Summary
IBM Notes 8.5 and 9.0 is vulnerable to a denial of service. If a user is persuaded to click on a malicious link, it would open up many file select dialog boxes which would cause the client hang and have to be restarted. IBM X-Force ID: 121371.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:25:17.244Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/121371" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21999384" }, { "name": "42604", "tags": [ "exploit", "x_refsource_EXPLOIT-DB", "x_transferred" ], "url": "https://www.exploit-db.com/exploits/42604/" }, { "name": "100632", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/100632" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Notes", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.5.3.6" }, { "status": "affected", "version": "8.5.2.4" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.0.1.8" }, { "status": "affected", "version": "8.5.2.1" } ] } ], "datePublic": "2017-08-31T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Notes 8.5 and 9.0 is vulnerable to a denial of service. If a user is persuaded to click on a malicious link, it would open up many file select dialog boxes which would cause the client hang and have to be restarted. IBM X-Force ID: 121371." } ], "problemTypes": [ { "descriptions": [ { "description": "Denial of Service", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-09-07T09:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/121371" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg21999384" }, { "name": "42604", "tags": [ "exploit", "x_refsource_EXPLOIT-DB" ], "url": "https://www.exploit-db.com/exploits/42604/" }, { "name": "100632", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/100632" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2017-08-31T00:00:00", "ID": "CVE-2017-1130", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Notes", "version": { "version_data": [ { "version_value": "8.5.3.6" }, { "version_value": "8.5.2.4" }, { "version_value": "9.0" }, { "version_value": "9.0.1.8" }, { "version_value": "8.5.2.1" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Notes 8.5 and 9.0 is vulnerable to a denial of service. If a user is persuaded to click on a malicious link, it would open up many file select dialog boxes which would cause the client hang and have to be restarted. IBM X-Force ID: 121371." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Denial of Service" } ] } ] }, "references": { "reference_data": [ { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/121371", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/121371" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg21999384", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg21999384" }, { "name": "42604", "refsource": "EXPLOIT-DB", "url": "https://www.exploit-db.com/exploits/42604/" }, { "name": "100632", "refsource": "BID", "url": "http://www.securityfocus.com/bid/100632" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2017-1130", "datePublished": "2017-09-05T21:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-16T21:58:13.936Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2017-1711 (GCVE-0-2017-1711)
Vulnerability from cvelistv5
Published
2018-02-13 20:00
Modified
2024-09-17 04:29
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Gain Privileges
Summary
IBM iNotes 8.5 and 9.0 SUService can be misguided into running malicious code from a DLL masquerading as a windows DLL in the temp directory. IBM X-Force ID: 134532.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | IBM | Client Application Access |
Version: 1.0.0.1 Version: 1.0.1.1 Version: 1.0.1.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T13:39:32.240Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010774" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010775" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134532" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Client Application Access", "vendor": "IBM", "versions": [ { "status": "affected", "version": "1.0.0.1" }, { "status": "affected", "version": "1.0.1.1" }, { "status": "affected", "version": "1.0.1.2" } ] }, { "product": "Notes", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.5.3.6" }, { "status": "affected", "version": "8.5.1.5" }, { "status": "affected", "version": "8.5.2.4" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.0.1.9" } ] } ], "datePublic": "2018-02-08T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM iNotes 8.5 and 9.0 SUService can be misguided into running malicious code from a DLL masquerading as a windows DLL in the temp directory. IBM X-Force ID: 134532." } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-13T19:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010774" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010775" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134532" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-02-08T00:00:00", "ID": "CVE-2017-1711", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Client Application Access", "version": { "version_data": [ { "version_value": "1.0.0.1" }, { "version_value": "1.0.1.1" }, { "version_value": "1.0.1.2" } ] } }, { "product_name": "Notes", "version": { "version_data": [ { "version_value": "8.5.3.6" }, { "version_value": "8.5.1.5" }, { "version_value": "8.5.2.4" }, { "version_value": "9.0" }, { "version_value": "9.0.1.9" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM iNotes 8.5 and 9.0 SUService can be misguided into running malicious code from a DLL masquerading as a windows DLL in the temp directory. IBM X-Force ID: 134532." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010774", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010774" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010775", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010775" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134532", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134532" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2017-1711", "datePublished": "2018-02-13T20:00:00Z", "dateReserved": "2016-11-30T00:00:00", "dateUpdated": "2024-09-17T04:29:16.940Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-1435 (GCVE-0-2018-1435)
Vulnerability from cvelistv5
Published
2018-03-14 00:00
Modified
2024-09-17 01:31
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Gain Access
Summary
IBM Notes 8.5 and 9.0 is vulnerable to a DLL hijacking attack. A remote attacker could trick a user to double click a malicious executable in an attacker-controlled directory, which could result in code execution. IBM X-Force ID: 139563.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:59:39.090Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "ibm-notes-cve20181435-code-exec(139563)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139563" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22014198" }, { "name": "103404", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/103404" }, { "name": "1040563", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id/1040563" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Notes", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.5.3.6" }, { "status": "affected", "version": "8.5" }, { "status": "affected", "version": "8.5.1" }, { "status": "affected", "version": "8.5.1.5" }, { "status": "affected", "version": "8.5.2" }, { "status": "affected", "version": "8.5.2.4" }, { "status": "affected", "version": "8.5.3" }, { "status": "affected", "version": "9.0.1" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "8.5.0.2" }, { "status": "affected", "version": "9.0.1.9" } ] } ], "datePublic": "2018-03-08T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Notes 8.5 and 9.0 is vulnerable to a DLL hijacking attack. A remote attacker could trick a user to double click a malicious executable in an attacker-controlled directory, which could result in code execution. IBM X-Force ID: 139563." } ], "metrics": [ { "cvssV3_0": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/A:H/AC:L/AV:L/C:H/I:H/PR:N/S:U/UI:R", "version": "3.0" } } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Access", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-04-07T09:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "name": "ibm-notes-cve20181435-code-exec(139563)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139563" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22014198" }, { "name": "103404", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/103404" }, { "name": "1040563", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id/1040563" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-03-08T00:00:00", "ID": "CVE-2018-1435", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Notes", "version": { "version_data": [ { "version_value": "8.5.3.6" }, { "version_value": "8.5" }, { "version_value": "8.5.1" }, { "version_value": "8.5.1.5" }, { "version_value": "8.5.2" }, { "version_value": "8.5.2.4" }, { "version_value": "8.5.3" }, { "version_value": "9.0.1" }, { "version_value": "9.0" }, { "version_value": "8.5.0.2" }, { "version_value": "9.0.1.9" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Notes 8.5 and 9.0 is vulnerable to a DLL hijacking attack. A remote attacker could trick a user to double click a malicious executable in an attacker-controlled directory, which could result in code execution. IBM X-Force ID: 139563." } ] }, "impact": { "cvssv3": { "BM": { "A": "H", "AC": "L", "AV": "L", "C": "H", "I": "H", "PR": "N", "S": "U", "UI": "R" } } }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Access" } ] } ] }, "references": { "reference_data": [ { "name": "ibm-notes-cve20181435-code-exec(139563)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139563" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22014198", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22014198" }, { "name": "103404", "refsource": "BID", "url": "http://www.securityfocus.com/bid/103404" }, { "name": "1040563", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id/1040563" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1435", "datePublished": "2018-03-14T00:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-17T01:31:06.993Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2018-1409 (GCVE-0-2018-1409)
Vulnerability from cvelistv5
Published
2018-02-19 14:00
Modified
2024-09-16 19:20
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Gain Privileges
Summary
IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138708.
References
► | URL | Tags | |||||||||
---|---|---|---|---|---|---|---|---|---|---|---|
|
Impacted products
Vendor | Product | Version | ||
---|---|---|---|---|
► | IBM | Client Application Access |
Version: 1.0.0.1 Version: 1.0.1 Version: 1.0.1.2 |
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-05T03:59:39.073Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138708" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "Client Application Access", "vendor": "IBM", "versions": [ { "status": "affected", "version": "1.0.0.1" }, { "status": "affected", "version": "1.0.1" }, { "status": "affected", "version": "1.0.1.2" } ] }, { "product": "Notes", "vendor": "IBM", "versions": [ { "status": "affected", "version": "8.5.3.6" }, { "status": "affected", "version": "8.5.1.5" }, { "status": "affected", "version": "8.5.2.4" }, { "status": "affected", "version": "9.0" }, { "status": "affected", "version": "9.0.1.9" } ] } ], "datePublic": "2018-02-13T00:00:00", "descriptions": [ { "lang": "en", "value": "IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138708." } ], "problemTypes": [ { "descriptions": [ { "description": "Gain Privileges", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-02-19T13:57:01", "orgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "shortName": "ibm" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "tags": [ "x_refsource_MISC" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138708" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "psirt@us.ibm.com", "DATE_PUBLIC": "2018-02-13T00:00:00", "ID": "CVE-2018-1409", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "Client Application Access", "version": { "version_data": [ { "version_value": "1.0.0.1" }, { "version_value": "1.0.1" }, { "version_value": "1.0.1.2" } ] } }, { "product_name": "Notes", "version": { "version_data": [ { "version_value": "8.5.3.6" }, { "version_value": "8.5.1.5" }, { "version_value": "8.5.2.4" }, { "version_value": "9.0" }, { "version_value": "9.0.1.9" } ] } } ] }, "vendor_name": "IBM" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138708." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Gain Privileges" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010766", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "name": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138708", "refsource": "MISC", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138708" }, { "name": "http://www.ibm.com/support/docview.wss?uid=swg22010767", "refsource": "CONFIRM", "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" } ] } } } }, "cveMetadata": { "assignerOrgId": "9a959283-ebb5-44b6-b705-dcc2bbced522", "assignerShortName": "ibm", "cveId": "CVE-2018-1409", "datePublished": "2018-02-19T14:00:00Z", "dateReserved": "2017-12-13T00:00:00", "dateUpdated": "2024-09-16T19:20:33.962Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2018-02-13 20:29
Modified
2024-11-21 03:22
Severity ?
Summary
IBM Notes and Domino NSD 8.5 and 9.0 could allow an authenticated local user without administrative privileges to gain System privilege. IBM X-Force ID: 134633.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg22010776 | Patch, Vendor Advisory | |
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg22010777 | Patch, Vendor Advisory | |
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/134633 | VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg22010776 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg22010777 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/134633 | VDB Entry, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | notes | 8.5.0.0 | |
ibm | notes | 8.5.1.0 | |
ibm | notes | 8.5.2.0 | |
ibm | notes | 8.5.3.0 | |
ibm | notes | 9.0.0.0 | |
ibm | notes | 9.0.1.0 | |
ibm | client_application_access | 1.0.1.0 | |
ibm | client_application_access | 1.0.1.1 | |
ibm | client_application_access | 1.0.1.1 | |
ibm | client_application_access | 1.0.1.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:notes:8.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0295E4E8-6A3E-44AE-935A-3BF4282AA4A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEFB0E44-E747-4685-8273-EF12E556D72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DB11113-37E2-4A92-A100-BA2BD01043FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D60EB9-26DF-4B03-923B-12DE5D8E5D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9327CB4C-30F0-47E0-9D3D-445CE49F6C19", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B784D714-6267-4314-AAC1-E8D1E8479F05", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEFB3033-7E8C-4042-A93D-0D9E43456120", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B201085B-5565-45DA-B82B-8E34B808B5FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.1:interim_fix_1:*:*:*:*:*:*", "matchCriteriaId": "C4E31A15-D77C-4DF7-A0A3-B4FA3D87892E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.2:interim_fix_1:*:*:*:*:*:*", "matchCriteriaId": "B20619CD-4A2C-499D-9349-81283A76B0C2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Notes and Domino NSD 8.5 and 9.0 could allow an authenticated local user without administrative privileges to gain System privilege. IBM X-Force ID: 134633." }, { "lang": "es", "value": "IBM Notes and Domino NSD 8.5 y 9.0 podr\u00edan permitir que un usuario local autenticado sin privilegios administrativos obtenga privilegios System. IBM X-Force ID: 134633." } ], "id": "CVE-2017-1714", "lastModified": "2024-11-21T03:22:15.413", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-13T20:29:00.327", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010776" }, { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010777" }, { "source": "psirt@us.ibm.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134633" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010776" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010777" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134633" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-19 14:29
Modified
2024-11-21 03:59
Severity ?
Summary
IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138709.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:notes:8.5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "72683B62-0BB1-4FB2-8661-447FCF535885", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "5FBB9A06-5600-4174-A4A5-C85059DDE4B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "99D14E8F-303F-4BE3-9BC4-0646B71A8660", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9ABFF78-233F-4413-AE17-C290D50E2E87", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "C0946E0E-508F-49D0-BBA8-8CB725BDD3D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8173749-67C8-46D1-8505-200ADF7A70D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "00FCFCE2-5023-4519-B42A-F9B7F818BF44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F62A11E-6224-4BC8-A46B-74A44D2F6A41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138709." }, { "lang": "es", "value": "IBM Notes Diagnostics (IBM Client Application Access e IBM Notes) podr\u00eda permitir que un usuario local ejecute comandos en el sistema. Esto se logra al manipular una l\u00ednea de comandos enviada mediante el IPC de la memoria compartida, la cual podr\u00eda ser forzada por el atacante para que ejecute un archivo ejecutable. IBM X-Force ID: 138709." } ], "id": "CVE-2018-1410", "lastModified": "2024-11-21T03:59:45.980", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-19T14:29:00.630", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "source": "psirt@us.ibm.com", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" }, { "source": "psirt@us.ibm.com", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138709" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138709" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-14 00:29
Modified
2024-11-21 03:59
Severity ?
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
IBM Notes 8.5 and 9.0 could allow an attacker to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. A local attacker could exploit this vulnerability to DLL hijacking to execute arbitrary code on the system or cause the application to crash. IBM X-Force ID: 139565.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg22014201 | Patch, Vendor Advisory | |
psirt@us.ibm.com | http://www.securityfocus.com/bid/103401 | Third Party Advisory, VDB Entry | |
psirt@us.ibm.com | http://www.securitytracker.com/id/1040563 | Third Party Advisory, VDB Entry | |
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/139565 | VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg22014201 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103401 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040563 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/139565 | VDB Entry, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:notes:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F7D9C09-7257-493B-9DDB-F310FBA93AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D950A9B5-EECB-4101-8D16-CB2E6A6077A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC345FBA-BDE8-443A-8B90-FB394AE9C31C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "72683B62-0BB1-4FB2-8661-447FCF535885", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "F11A6454-9322-467F-B305-820A54A1EC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "5FBB9A06-5600-4174-A4A5-C85059DDE4B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "BB9D342A-15AA-4627-8BB5-4F99271265B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "99D14E8F-303F-4BE3-9BC4-0646B71A8660", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9ABFF78-233F-4413-AE17-C290D50E2E87", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FF1783BE-BA10-43E6-89DB-DBEAFDC7416B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "C0946E0E-508F-49D0-BBA8-8CB725BDD3D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Notes 8.5 and 9.0 could allow an attacker to execute arbitrary code on the system, caused by an error related to multiple untrusted search path. A local attacker could exploit this vulnerability to DLL hijacking to execute arbitrary code on the system or cause the application to crash. IBM X-Force ID: 139565." }, { "lang": "es", "value": "IBM Notes 8.5 y 9.0 podr\u00eda permitir que un atacante ejecute c\u00f3digo arbitrario en el sistema. Esto ha sido provocado por un error relacionado con m\u00faltiples rutas de b\u00fasqueda no fiables. Un atacante local podr\u00eda explotar esta vulnerabilidad de secuestro de DLL para ejecutar c\u00f3digo arbitrario en el sistema o provocar que la aplicaci\u00f3n se cierre inesperadamente. IBM X-Force ID: 139565." } ], "id": "CVE-2018-1437", "lastModified": "2024-11-21T03:59:49.130", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@us.ibm.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-14T00:29:00.373", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22014201" }, { "source": "psirt@us.ibm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103401" }, { "source": "psirt@us.ibm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040563" }, { "source": "psirt@us.ibm.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139565" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22014201" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103401" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139565" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-03-14 00:29
Modified
2024-11-21 03:59
Severity ?
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
Summary
IBM Notes 8.5 and 9.0 is vulnerable to a DLL hijacking attack. A remote attacker could trick a user to double click a malicious executable in an attacker-controlled directory, which could result in code execution. IBM X-Force ID: 139563.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg22014198 | Patch, Vendor Advisory | |
psirt@us.ibm.com | http://www.securityfocus.com/bid/103404 | Third Party Advisory, VDB Entry | |
psirt@us.ibm.com | http://www.securitytracker.com/id/1040563 | Third Party Advisory, VDB Entry | |
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/139563 | VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg22014198 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/103404 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1040563 | Third Party Advisory, VDB Entry | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/139563 | VDB Entry, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:notes:8.5:*:*:*:*:*:*:*", "matchCriteriaId": "3F7D9C09-7257-493B-9DDB-F310FBA93AC6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "D950A9B5-EECB-4101-8D16-CB2E6A6077A6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "AC345FBA-BDE8-443A-8B90-FB394AE9C31C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "72683B62-0BB1-4FB2-8661-447FCF535885", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "F11A6454-9322-467F-B305-820A54A1EC8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "5FBB9A06-5600-4174-A4A5-C85059DDE4B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "BB9D342A-15AA-4627-8BB5-4F99271265B6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "99D14E8F-303F-4BE3-9BC4-0646B71A8660", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9ABFF78-233F-4413-AE17-C290D50E2E87", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "FF1783BE-BA10-43E6-89DB-DBEAFDC7416B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "C0946E0E-508F-49D0-BBA8-8CB725BDD3D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Notes 8.5 and 9.0 is vulnerable to a DLL hijacking attack. A remote attacker could trick a user to double click a malicious executable in an attacker-controlled directory, which could result in code execution. IBM X-Force ID: 139563." }, { "lang": "es", "value": "IBM Notes 8.5 y 9.0 es vulnerable a un ataque de secuestro de DLL. Un atacante remoto podr\u00eda enga\u00f1ar a un usuario para que haga doble clic sobre un ejecutable malicioso en un directorio controlado por el atacante, lo que podr\u00eda resultar en la ejecuci\u00f3n de c\u00f3digo. IBM X-Force ID: 139563." } ], "id": "CVE-2018-1435", "lastModified": "2024-11-21T03:59:48.993", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "psirt@us.ibm.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-03-14T00:29:00.327", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22014198" }, { "source": "psirt@us.ibm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103404" }, { "source": "psirt@us.ibm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040563" }, { "source": "psirt@us.ibm.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22014198" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/103404" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securitytracker.com/id/1040563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/139563" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-13 20:29
Modified
2024-11-21 03:22
Severity ?
Summary
IBM iNotes 8.5 and 9.0 SUService can be misguided into running malicious code from a DLL masquerading as a windows DLL in the temp directory. IBM X-Force ID: 134532.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg22010774 | Patch, Vendor Advisory | |
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg22010775 | Patch, Vendor Advisory | |
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/134532 | VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg22010774 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg22010775 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/134532 | VDB Entry, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | notes | 8.5.0.0 | |
ibm | notes | 8.5.1.0 | |
ibm | notes | 8.5.2.0 | |
ibm | notes | 8.5.3.0 | |
ibm | notes | 9.0.0.0 | |
ibm | notes | 9.0.1.0 | |
ibm | client_application_access | 1.0.1.0 | |
ibm | client_application_access | 1.0.1.1 | |
ibm | client_application_access | 1.0.1.1 | |
ibm | client_application_access | 1.0.1.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:notes:8.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0295E4E8-6A3E-44AE-935A-3BF4282AA4A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEFB0E44-E747-4685-8273-EF12E556D72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DB11113-37E2-4A92-A100-BA2BD01043FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D60EB9-26DF-4B03-923B-12DE5D8E5D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9327CB4C-30F0-47E0-9D3D-445CE49F6C19", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B784D714-6267-4314-AAC1-E8D1E8479F05", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEFB3033-7E8C-4042-A93D-0D9E43456120", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B201085B-5565-45DA-B82B-8E34B808B5FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.1:interim_fix_1:*:*:*:*:*:*", "matchCriteriaId": "C4E31A15-D77C-4DF7-A0A3-B4FA3D87892E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.2:interim_fix_1:*:*:*:*:*:*", "matchCriteriaId": "B20619CD-4A2C-499D-9349-81283A76B0C2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM iNotes 8.5 and 9.0 SUService can be misguided into running malicious code from a DLL masquerading as a windows DLL in the temp directory. IBM X-Force ID: 134532." }, { "lang": "es", "value": "Las versiones 8.5 y 9.0 de IBM iNotes SUService pueden manipularse para que ejecuten c\u00f3digo malicioso de un DLL disfrazado de DLL de windows en el directorio temp. IBM X-Force ID: 134532." } ], "id": "CVE-2017-1711", "lastModified": "2024-11-21T03:22:15.060", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 6.8, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-13T20:29:00.263", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010774" }, { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010775" }, { "source": "psirt@us.ibm.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134532" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010775" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134532" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-426" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-05-16 19:29
Modified
2024-11-21 03:18
Severity ?
Summary
The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL.
References
Impacted products
Vendor | Product | Version | |
---|---|---|---|
9folders | nine | - | |
apple | - | ||
apple | - | ||
bloop | airmail | - | |
emclient | emclient | - | |
flipdogsolutions | maildroid | - | |
freron | mailmate | - | |
gnome | evolution | - | |
gmail | - | ||
horde | horde_imp | - | |
ibm | notes | - | |
kde | kmail | - | |
kde | trojita | - | |
microsoft | outlook | 2007 | |
microsoft | outlook | 2010 | |
microsoft | outlook | 2013 | |
microsoft | outlook | 2016 | |
mozilla | thunderbird | - | |
postbox-inc | postbox | - | |
r2mail2 | r2mail2 | - | |
ritlabs | the_bat | - |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:9folders:nine:-:*:*:*:*:*:*:*", "matchCriteriaId": "8EE489EA-2250-4BF0-800C-EDA6EA7D6AAE", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:mail:-:*:*:*:*:*:*:*", "matchCriteriaId": "217117AE-C16C-4265-A9A9-152D06FCD64E", "vulnerable": true }, { "criteria": "cpe:2.3:a:apple:mail:-:*:*:*:*:iphone_os:*:*", "matchCriteriaId": "081D62F6-B751-4109-B10B-3CF9535B3C12", "vulnerable": true }, { "criteria": "cpe:2.3:a:bloop:airmail:-:*:*:*:*:*:*:*", "matchCriteriaId": "F389CED1-846A-4807-B8E7-00FBECAA41A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:emclient:emclient:-:*:*:*:*:*:*:*", "matchCriteriaId": "930AFDDA-C32A-45E7-BA6E-5827E59B573B", "vulnerable": true }, { "criteria": "cpe:2.3:a:flipdogsolutions:maildroid:-:*:*:*:*:*:*:*", "matchCriteriaId": "ED2616EA-332D-4D6E-B66C-137A166E181D", "vulnerable": true }, { "criteria": "cpe:2.3:a:freron:mailmate:-:*:*:*:*:*:*:*", "matchCriteriaId": "2C26D918-1548-4A62-BC5C-72DF9168A34E", "vulnerable": true }, { "criteria": "cpe:2.3:a:gnome:evolution:-:*:*:*:*:*:*:*", "matchCriteriaId": "38B06B0D-E60A-4B61-9E39-F5116C8F22A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:google:gmail:-:*:*:*:*:*:*:*", "matchCriteriaId": "C671802A-2362-4E66-B5D5-079E5E6B89A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:horde:horde_imp:-:*:*:*:*:*:*:*", "matchCriteriaId": "FDAD39AA-B9FD-492B-9BDA-57F74F4FABE5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:-:*:*:*:*:*:*:*", "matchCriteriaId": "91669C83-56A0-4087-8B6D-2012EB0AE9D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:kmail:-:*:*:*:*:*:*:*", "matchCriteriaId": "9F01C924-2AE4-4214-9139-ED08293D198C", "vulnerable": true }, { "criteria": "cpe:2.3:a:kde:trojita:-:*:*:*:*:*:*:*", "matchCriteriaId": "93076D12-C4AD-4DE8-A76C-9819493FF516", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2007:*:*:*:*:*:*:*", "matchCriteriaId": "D789259A-034E-40BB-9DFF-76B3104B212F", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2010:*:*:*:*:*:*:*", "matchCriteriaId": "3A009EAF-41A1-4E6D-B1EB-A2DACE197A43", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2013:*:*:*:*:*:*:*", "matchCriteriaId": "3CD3770E-9513-43B2-BC9E-0CA3F63D59FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:microsoft:outlook:2016:*:*:*:*:*:*:*", "matchCriteriaId": "E2B1657C-0FF4-461A-BE2A-641275C4B0A0", "vulnerable": true }, { "criteria": "cpe:2.3:a:mozilla:thunderbird:-:*:*:*:*:*:*:*", "matchCriteriaId": "FF583CDC-DE9E-45AB-9861-CB203BFA8862", "vulnerable": true }, { "criteria": "cpe:2.3:a:postbox-inc:postbox:-:*:*:*:*:*:*:*", "matchCriteriaId": "C0BA111F-A9FB-457D-818E-412195F9EA0A", "vulnerable": true }, { "criteria": "cpe:2.3:a:r2mail2:r2mail2:-:*:*:*:*:*:*:*", "matchCriteriaId": "19296516-EAD4-4B08-8D9A-5E853C7BEF58", "vulnerable": true }, { "criteria": "cpe:2.3:a:ritlabs:the_bat:-:*:*:*:*:*:*:*", "matchCriteriaId": "48A3CC49-2FAC-40C9-9CDA-E4440577205E", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The S/MIME specification allows a Cipher Block Chaining (CBC) malleability-gadget attack that can indirectly lead to plaintext exfiltration, aka EFAIL." }, { "lang": "es", "value": "La especificaci\u00f3n S/MIME permite un ataque malleability-gadget Cipher Block Chaining (CBC) que puede conducir indirectamente a la exfiltraci\u00f3n en texto plano. Esto tambi\u00e9n se conoce como EFAIL." } ], "id": "CVE-2017-17689", "lastModified": "2024-11-21T03:18:27.893", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-05-16T19:29:00.303", "references": [ { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104165" }, { "source": "cve@mitre.org", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://efail.de" }, { "source": "cve@mitre.org", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=17066419" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://pastebin.com/gNCc8aYm" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/matthew_d_green/status/996371541591019520" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_22" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/104165" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Exploit", "Mitigation", "Third Party Advisory" ], "url": "https://efail.de" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Issue Tracking", "Third Party Advisory" ], "url": "https://news.ycombinator.com/item?id=17066419" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://pastebin.com/gNCc8aYm" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://twitter.com/matthew_d_green/status/996371541591019520" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.synology.com/support/security/Synology_SA_18_22" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-13 20:29
Modified
2024-11-21 03:22
Severity ?
Summary
IBM Notes 8.5 and 9.0 could allow a local attacker to execute arbitrary commands by carefully crafting a command line sent via the shared memory IPC. IBM X-Force ID: 134807.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg22010766 | Patch, Vendor Advisory | |
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg22010767 | Patch, Vendor Advisory | |
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/134807 | VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg22010766 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg22010767 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/134807 | VDB Entry, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | notes | 8.5.0.0 | |
ibm | notes | 8.5.1.0 | |
ibm | notes | 8.5.2.0 | |
ibm | notes | 8.5.3.0 | |
ibm | notes | 9.0.0.0 | |
ibm | notes | 9.0.1.0 | |
ibm | client_application_access | 1.0.1.0 | |
ibm | client_application_access | 1.0.1.1 | |
ibm | client_application_access | 1.0.1.1 | |
ibm | client_application_access | 1.0.1.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:notes:8.5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "0295E4E8-6A3E-44AE-935A-3BF4282AA4A4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "BEFB0E44-E747-4685-8273-EF12E556D72B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "4DB11113-37E2-4A92-A100-BA2BD01043FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.3.0:*:*:*:*:*:*:*", "matchCriteriaId": "02D60EB9-26DF-4B03-923B-12DE5D8E5D94", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "9327CB4C-30F0-47E0-9D3D-445CE49F6C19", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "B784D714-6267-4314-AAC1-E8D1E8479F05", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.0:*:*:*:*:*:*:*", "matchCriteriaId": "EEFB3033-7E8C-4042-A93D-0D9E43456120", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.1:*:*:*:*:*:*:*", "matchCriteriaId": "B201085B-5565-45DA-B82B-8E34B808B5FB", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.1:interim_fix_1:*:*:*:*:*:*", "matchCriteriaId": "C4E31A15-D77C-4DF7-A0A3-B4FA3D87892E", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.2:interim_fix_1:*:*:*:*:*:*", "matchCriteriaId": "B20619CD-4A2C-499D-9349-81283A76B0C2", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Notes 8.5 and 9.0 could allow a local attacker to execute arbitrary commands by carefully crafting a command line sent via the shared memory IPC. IBM X-Force ID: 134807." }, { "lang": "es", "value": "Las versiones 8.5 y 9.0 de IBM Notes podr\u00edan permitir que un atacante local ejecute comandos arbitrarios manipulando cuidadosamente una l\u00ednea de comandos enviada mediante el IPC de la memoria compartida. IBM X-Force ID: 134807." } ], "id": "CVE-2017-1720", "lastModified": "2024-11-21T03:22:15.907", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "PARTIAL", "baseScore": 4.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "LOW", "baseScore": 5.3, "baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "integrityImpact": "LOW", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 3.4, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-13T20:29:00.387", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" }, { "source": "psirt@us.ibm.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134807" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/134807" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-77" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-19 14:29
Modified
2024-11-21 03:59
Severity ?
Summary
IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138710.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg22010766 | Vendor Advisory | |
psirt@us.ibm.com | http://www.ibm.com/support/docview.wss?uid=swg22010767 | Vendor Advisory | |
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/138710 | VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg22010766 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.ibm.com/support/docview.wss?uid=swg22010767 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/138710 | VDB Entry, Vendor Advisory |
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:notes:8.5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "72683B62-0BB1-4FB2-8661-447FCF535885", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "5FBB9A06-5600-4174-A4A5-C85059DDE4B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "99D14E8F-303F-4BE3-9BC4-0646B71A8660", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9ABFF78-233F-4413-AE17-C290D50E2E87", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "C0946E0E-508F-49D0-BBA8-8CB725BDD3D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8173749-67C8-46D1-8505-200ADF7A70D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "00FCFCE2-5023-4519-B42A-F9B7F818BF44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F62A11E-6224-4BC8-A46B-74A44D2F6A41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138710." }, { "lang": "es", "value": "IBM Notes Diagnostics (IBM Client Application Access e IBM Notes) podr\u00eda permitir que un usuario local ejecute comandos en el sistema. Esto se logra al manipular una l\u00ednea de comandos enviada mediante el IPC de la memoria compartida, la cual podr\u00eda ser forzada por el atacante para que ejecute un archivo ejecutable. IBM X-Force ID: 138710." } ], "id": "CVE-2018-1411", "lastModified": "2024-11-21T03:59:46.090", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-19T14:29:00.693", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "source": "psirt@us.ibm.com", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" }, { "source": "psirt@us.ibm.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138710" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138710" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-02-19 14:29
Modified
2024-11-21 03:59
Severity ?
Summary
IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138708.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:notes:8.5.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "72683B62-0BB1-4FB2-8661-447FCF535885", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.2.4:*:*:*:*:*:*:*", "matchCriteriaId": "5FBB9A06-5600-4174-A4A5-C85059DDE4B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:8.5.3.6:*:*:*:*:*:*:*", "matchCriteriaId": "99D14E8F-303F-4BE3-9BC4-0646B71A8660", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0:*:*:*:*:*:*:*", "matchCriteriaId": "C9ABFF78-233F-4413-AE17-C290D50E2E87", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.9:*:*:*:*:*:*:*", "matchCriteriaId": "C0946E0E-508F-49D0-BBA8-8CB725BDD3D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8173749-67C8-46D1-8505-200ADF7A70D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "00FCFCE2-5023-4519-B42A-F9B7F818BF44", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "3F62A11E-6224-4BC8-A46B-74A44D2F6A41", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Notes Diagnostics (IBM Client Application Access and IBM Notes) could allow a local user to execute commands on the system. By crafting a command line sent via the shared memory IPC, which could be tricked into executing an executable chosen by the attacker. IBM X-Force ID: 138708." }, { "lang": "es", "value": "IBM Notes Diagnostics (IBM Client Application Access e IBM Notes) podr\u00eda permitir que un usuario local ejecute comandos en el sistema. Esto se logra al manipular una l\u00ednea de comandos enviada mediante el IPC de la memoria compartida, la cual podr\u00eda ser forzada por el atacante para que ejecute un archivo ejecutable. IBM X-Force ID: 138708." } ], "id": "CVE-2018-1409", "lastModified": "2024-11-21T03:59:45.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-02-19T14:29:00.583", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "source": "psirt@us.ibm.com", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" }, { "source": "psirt@us.ibm.com", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138708" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010766" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.ibm.com/support/docview.wss?uid=swg22010767" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/138708" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2020-02-21 17:15
Modified
2024-11-21 01:45
Severity ?
Summary
Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8.5.x, IBM Lotus Domino 8.5.x before 8.5.3 FP4, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, related to "a number of underlying issues" in which "some of these cases demonstrated memory corruption with attacker-controlled input and could be exploited to run arbitrary code."
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:domino:*:*:*:*:*:*:*:*", "matchCriteriaId": "4FE05C15-E8B6-440F-BFB5-4A1CA7D3B382", "versionEndIncluding": "8.5.3.6", "versionStartIncluding": "8.5.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:*:*:*:*:*:*:*:*", "matchCriteriaId": "DB8FF0B4-21A9-414D-938A-B27D6EF8350E", "versionEndIncluding": "8.5.3", "versionStartIncluding": "8.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:symantec:data_loss_prevention_endpoint:*:*:*:*:*:*:*:*", "matchCriteriaId": "9B17C35B-5DF5-42CF-B97E-FB2D24747603", "versionEndExcluding": "11.6.1", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:data_loss_prevention_enforce\\/detection_servers:*:*:*:*:*:linux:*:*", "matchCriteriaId": "32914759-628E-4F6E-8ADA-291F4F80FF62", "versionEndExcluding": "11.6.1", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:data_loss_prevention_enforce\\/detection_servers:*:*:*:*:*:windows:*:*", "matchCriteriaId": "056E5F20-0573-45E8-80A2-F1B5516500EF", "versionEndExcluding": "11.6.1", "versionStartIncluding": "11.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:*:*:*:*:*:microsoft_exchange:*:*", "matchCriteriaId": "05E1DA05-2A64-4B66-9C3A-42407BAE35F4", "versionEndIncluding": "6.5.7", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:*:*:*:*:*:domino:*:*", "matchCriteriaId": "741E89BC-A1F6-4385-B5FC-8541E9C71BB8", "versionEndIncluding": "8.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:6.5.7:*:*:*:*:*:*:*", "matchCriteriaId": "B40695CA-A51A-4383-9E99-5FBC1AD8F6F5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:messaging_gateway:*:*:*:*:*:*:*:*", "matchCriteriaId": "F0A7C81B-DA0B-4A32-98ED-9D3A26CB3A49", "versionEndExcluding": "10.0.1", "versionStartIncluding": "9.5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:hp:autonomy_keyview_idol:*:*:*:*:*:*:*:*", "matchCriteriaId": "6D21A9CB-B944-4087-A20F-5DBDDB43E6D1", "versionEndExcluding": "10.16", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8.5.x, IBM Lotus Domino 8.5.x before 8.5.3 FP4, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, related to \"a number of underlying issues\" in which \"some of these cases demonstrated memory corruption with attacker-controlled input and could be exploited to run arbitrary code.\"" }, { "lang": "es", "value": "M\u00faltiples vulnerabilidades no especificadas en Autonomy KeyView IDOL versiones anteriores a 10.16, como es usado en Symantec Mail Security para Microsoft Exchange versiones anteriores a 6.5.8, Symantec Mail Security para Domino versiones anteriores a 8.1.1, Symantec Messaging Gateway versiones anteriores a 10.0.1, Symantec Data Loss Prevention (DLP) versiones anteriores a 11.6.1, IBM Notes versiones 8.5.x, IBM Lotus Domino versiones 8.5.x anteriores a 8.5.3 FP4, y otros productos, permite a atacantes remotos ejecutar c\u00f3digo arbitrario o causar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria) por medio de un archivo dise\u00f1ado, relacionado con \"una serie de problemas subyacentes\" en los que \"algunos de estos casos demostraron corrupci\u00f3n de la memoria con una entrada controlada por el atacante y podr\u00edan ser explotados para ejecutar c\u00f3digo arbitrario\"." } ], "id": "CVE-2012-6277", "lastModified": "2024-11-21T01:45:58.210", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "REQUIRED", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-02-21T17:15:10.883", "references": [ { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "https://support.symantec.com/us/en/article.symsa1262.html" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=27482" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://vulmon.com/vulnerabilitydetails?qid=CVE-2012-6277" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.energy.gov/cio/articles/v-118-ibm-lotus-domino-multiple-vulnerabilities" }, { "source": "cret@cert.org", "tags": [ "Vendor Advisory" ], "url": "https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-addressed-in-ibm-notes-9-0-cve-2011-3026-cve-2012-6349-cve-2012-6277/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/849841/" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.securityfocus.com/bid/56610" }, { "source": "cret@cert.org", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/plugins/nessus/67192" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://support.symantec.com/us/en/article.symsa1262.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://tools.cisco.com/security/center/viewAlert.x?alertId=27482" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://vulmon.com/vulnerabilitydetails?qid=CVE-2012-6277" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.energy.gov/cio/articles/v-118-ibm-lotus-domino-multiple-vulnerabilities" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-addressed-in-ibm-notes-9-0-cve-2011-3026-cve-2012-6349-cve-2012-6277/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "https://www.kb.cert.org/vuls/id/849841/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "https://www.securityfocus.com/bid/56610" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://www.tenable.com/plugins/nessus/67192" } ], "sourceIdentifier": "cret@cert.org", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "NVD-CWE-noinfo" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2018-12-20 14:29
Modified
2024-11-21 04:00
Severity ?
8.4 (High) - CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
7.8 (High) - CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
Summary
IBM Domino 9.0 and 9.0.1 could allow an attacker to execute commands on the system by triggering a buffer overflow in the parsing of command line arguments passed to nsd.exe. IBM X-force ID: 148687.
References
▶ | URL | Tags | |
---|---|---|---|
psirt@us.ibm.com | https://exchange.xforce.ibmcloud.com/vulnerabilities/148687 | VDB Entry, Vendor Advisory | |
psirt@us.ibm.com | https://www.ibm.com/support/docview.wss?uid=ibm10743405 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/148687 | VDB Entry, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://www.ibm.com/support/docview.wss?uid=ibm10743405 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
ibm | domino | * | |
ibm | domino | 9.0.0.0 | |
ibm | domino | 9.0.0.0 | |
ibm | domino | 9.0.0.0 | |
ibm | domino | 9.0.0.0 | |
ibm | domino | 9.0.1.10 | |
ibm | domino | 9.0.1.10 | |
ibm | domino | 9.0.1.10 | |
ibm | domino | 9.0.1.10 | |
ibm | notes | * | |
ibm | notes | 9.0.0.0 | |
ibm | notes | 9.0.0.0 | |
ibm | notes | 9.0.0.0 | |
ibm | notes | 9.0.0.0 | |
ibm | notes | 9.0.1.10 | |
ibm | notes | 9.0.1.10 | |
ibm | notes | 9.0.1.10 | |
ibm | notes | 9.0.1.10 | |
ibm | notes | 9.0.1.10 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:domino:*:*:*:*:*:*:*:*", "matchCriteriaId": "B2ABCCAF-0BAF-43D0-9CC9-07208DAF824F", "versionEndIncluding": "9.0.1.10", "versionStartIncluding": "9.0.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:domino:9.0.0.0:if1:*:*:*:*:*:*", "matchCriteriaId": "95B0C353-47E1-422D-B91B-4B764D248292", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:domino:9.0.0.0:if2:*:*:*:*:*:*", "matchCriteriaId": "D3950AE9-589C-46F7-8A3E-EB15D8E9227B", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:domino:9.0.0.0:if3:*:*:*:*:*:*", "matchCriteriaId": "404E56E1-230C-4A8A-A688-5E06BC8E7E52", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:domino:9.0.0.0:if4:*:*:*:*:*:*", "matchCriteriaId": "5701F2D9-F0D0-4294-96FA-EF953E11D41A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:domino:9.0.1.10:if1:*:*:*:*:*:*", "matchCriteriaId": "6D46F74B-B11C-4896-9643-854DA5038BC2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:domino:9.0.1.10:if2:*:*:*:*:*:*", "matchCriteriaId": "3D133CFA-9EC2-4B32-A956-6146857CD032", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:domino:9.0.1.10:if3:*:*:*:*:*:*", "matchCriteriaId": "8DD76DBD-5EFA-4880-B872-165548A9B0A5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:domino:9.0.1.10:if4:*:*:*:*:*:*", "matchCriteriaId": "E61C8493-3F84-4B90-8D11-29E690960D07", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:*:*:*:*:*:*:*:*", "matchCriteriaId": "863D67C1-FC55-4E89-83AF-9BEE3B990CBE", "versionEndIncluding": "9.0.1.10", "versionStartIncluding": "9.0.1.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.0.0:if1:*:*:*:*:*:*", "matchCriteriaId": "853E12FE-40EB-40ED-9245-7CBD05D9BEC9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.0.0:if2:*:*:*:*:*:*", "matchCriteriaId": "EBC3B7DB-578E-4C0E-9598-03D791094AC7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.0.0:if3:*:*:*:*:*:*", "matchCriteriaId": "E9CF936F-00EF-4DD7-B80B-47D64866AE88", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.0.0:if4:*:*:*:*:*:*", "matchCriteriaId": "FD2E5893-C2FA-4191-B861-39E60BB60979", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.10:if1:*:*:*:*:*:*", "matchCriteriaId": "9BC3FE1F-B09F-4B65-855A-41E8BF522E6A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.10:if2:*:*:*:*:*:*", "matchCriteriaId": "EDB9DABC-51B3-459C-924C-167AC1D572DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.10:if3:*:*:*:*:*:*", "matchCriteriaId": "ECC028B6-D9A6-4CB8-A074-7A36694E3356", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.10:if4:*:*:*:*:*:*", "matchCriteriaId": "8C7450F2-09D0-466E-8F18-F213CCFD5081", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.10:if5:*:*:*:*:*:*", "matchCriteriaId": "D568103C-FFF1-4D2F-8C22-3D3AA39DD533", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Domino 9.0 and 9.0.1 could allow an attacker to execute commands on the system by triggering a buffer overflow in the parsing of command line arguments passed to nsd.exe. IBM X-force ID: 148687." }, { "lang": "es", "value": "IBM Domino 9.0 y 9.0.1 podr\u00eda permitir que un atacante ejecute comandos en el sistema desencadenando un desbordamiento de b\u00fafer en el an\u00e1lisis de los argumentos de la l\u00ednea de comandos que se pasan a nsd.exe. IBM X-Force ID: 148687." } ], "id": "CVE-2018-1771", "lastModified": "2024-11-21T04:00:20.303", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 8.4, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 2.5, "impactScore": 5.9, "source": "psirt@us.ibm.com", "type": "Secondary" }, { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.0" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2018-12-20T14:29:00.387", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/148687" }, { "source": "psirt@us.ibm.com", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.ibm.com/support/docview.wss?uid=ibm10743405" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "VDB Entry", "Vendor Advisory" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/148687" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "https://www.ibm.com/support/docview.wss?uid=ibm10743405" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2017-02-08 16:59
Modified
2025-04-20 01:37
Severity ?
Summary
IBM Domino 9.0.1 Fix Pack 3 Interim Fix 2 through 9.0.1 Fix Pack 5 Interim Fix 1, when using TLS and AES GCM, uses random nonce generation, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a "forbidden attack." NOTE: this CVE has been incorrectly used for GCM nonce reuse issues in other products; see CVE-2016-10213 for the A10 issue, CVE-2016-10212 for the Radware issue, and CVE-2017-5933 for the Citrix issue.
References
Impacted products
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:client_application_access:1.0.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "D8173749-67C8-46D1-8505-200ADF7A70D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:domino:9.0.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "BF7A97DE-36BC-4DFC-9F44-EF2C155703B7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:domino:9.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "4C05B1F1-EDFC-46AC-B701-13652ABA7065", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:domino:9.0.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "D246A5C6-E12D-4B5D-8319-0A9F52899173", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.3:*:*:*:*:*:*:*", "matchCriteriaId": "A6C10DAB-5579-4273-9B5E-58199A978DD6", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.4:*:*:*:*:*:*:*", "matchCriteriaId": "AFAB1EE7-3835-4AD6-8F13-01C1CB62F98D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:notes:9.0.1.5:*:*:*:*:*:*:*", "matchCriteriaId": "320A0EC3-D4DC-4CEC-B71A-47658A8C17AC", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "IBM Domino 9.0.1 Fix Pack 3 Interim Fix 2 through 9.0.1 Fix Pack 5 Interim Fix 1, when using TLS and AES GCM, uses random nonce generation, which makes it easier for remote attackers to obtain the authentication key and spoof data by leveraging the reuse of a nonce in a session and a \"forbidden attack.\" NOTE: this CVE has been incorrectly used for GCM nonce reuse issues in other products; see CVE-2016-10213 for the A10 issue, CVE-2016-10212 for the Radware issue, and CVE-2017-5933 for the Citrix issue." }, { "lang": "es", "value": "IBM Domino 9.0.1 Fix Pack 3 Interim Fix 2 hasta la versi\u00f3n 9.0.1 Fix Pack 5 Interim Fix 1, cuando se usa TLS y AES GCM, utiliza generaci\u00f3n aleatoria de nonce, lo que facilita a atacantes remotos obtener la clave de autenticaci\u00f3n y suplantar datos aprovechando la reutilizaci\u00f3n de un nonce en una sesi\u00f3n y un \"ataque prohibido\". NOTA: esta CVE ha sido usada incorrectamente para problemas de reutilizaci\u00f3n de GCM nonce en otros productos; ver CVE-2016-10213 para el problema A10, CVE-2016-10212 para el problema Radware y CVE-2017-5933 para el problema Citrix." } ], "id": "CVE-2016-0270", "lastModified": "2025-04-20T01:37:25.860", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "MEDIUM", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 4.3, "confidentialityImpact": "PARTIAL", "integrityImpact": "NONE", "vectorString": "AV:N/AC:M/Au:N/C:P/I:N/A:N", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 2.9, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV30": [ { "cvssData": { "attackComplexity": "HIGH", "attackVector": "NETWORK", "availabilityImpact": "NONE", "baseScore": 5.9, "baseSeverity": "MEDIUM", "confidentialityImpact": "HIGH", "integrityImpact": "NONE", "privilegesRequired": "NONE", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N", "version": "3.0" }, "exploitabilityScore": 2.2, "impactScore": 3.6, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2017-02-08T16:59:00.133", "references": [ { "source": "psirt@us.ibm.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979604" }, { "source": "psirt@us.ibm.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979669" }, { "source": "psirt@us.ibm.com", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979673" }, { "source": "psirt@us.ibm.com", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96062" }, { "source": "psirt@us.ibm.com", "url": "http://www.securitytracker.com/id/1037795" }, { "source": "psirt@us.ibm.com", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nonce-disrespect/nonce-disrespect" }, { "source": "psirt@us.ibm.com", "url": "https://support.citrix.com/article/CTX220329" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979604" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979669" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mitigation", "Patch", "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21979673" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "VDB Entry" ], "url": "http://www.securityfocus.com/bid/96062" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id/1037795" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "https://github.com/nonce-disrespect/nonce-disrespect" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://support.citrix.com/article/CTX220329" } ], "sourceIdentifier": "psirt@us.ibm.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-200" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }