Buffer overflow in Notes server before Lotus Notes R4, R5 before 5.0.11, and early R6 allows remote attackers to execute arbitrary code via a long distinguished name (DN) during NotesRPC authentication and an outer field length that is less than that of the DN field.
References
Link | Resource |
---|---|
http://www-1.ibm.com/support/docview.wss?rs=482&q=Domino&uid=swg21105101 | Broken Link |
http://www.securityfocus.com/bid/7037 | Patch Third Party Advisory VDB Entry Vendor Advisory |
http://www.rapid7.com/advisories/R7-0010.html | Not Applicable |
http://archives.neohapsis.com/archives/vulnwatch/2003-q1/0125.html | Third Party Advisory |
http://www.cert.org/advisories/CA-2003-11.html | Third Party Advisory US Government Resource |
http://www.kb.cert.org/vuls/id/433489 | Third Party Advisory US Government Resource |
http://www.ciac.org/ciac/bulletins/n-065.shtml | Broken Link |
http://marc.info/?l=bugtraq&m=104757319829443&w=2 | Mailing List Third Party Advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/11526 | Third Party Advisory VDB Entry |
Configurations
Configuration 1 (hide)
|
Information
Published : 2003-03-17 21:00
Updated : 2017-12-12 09:05
NVD link : CVE-2003-0122
Mitre link : CVE-2003-0122
JSON object : View
CWE
Products Affected
ibm
- lotus_domino
- lotus_notes_client