CVE-2011-0912
Published Feb 8, 2011
Last updated 7 years ago
Overview
- Description
- Argument injection vulnerability in IBM Lotus Notes 8.0.x before 8.0.2 FP6 and 8.5.x before 8.5.1 FP5 allows remote attackers to execute arbitrary code via a cai:// URL containing a --launcher.library option that specifies a UNC share pathname for a DLL file, aka SPR PRAD82YJW2.
- Source
- cve@mitre.org
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "692E295E-E650-42D5-AF7A-D6276C3D76E0" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "50660BA1-A24A-4DBF-AB59-1CF04FA54120" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5759CBCB-7B3F-462A-B51A-FD2C6B13CCE6" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.0.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69A79FA5-83FB-4067-B2A6-17EAF3947998" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.0.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "17815F4E-BB34-40D2-A3EE-3C7741940D1B" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.0.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7DE79982-9E92-498A-B961-55CB1D2D104F" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.0.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F6814E3F-479C-4F56-BF66-C685E60CCA34" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.0.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BB9EF5DE-4432-4099-AD59-CDD52E387BB8" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.0.2.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1013797-0442-46A7-A94F-354388BA6B69" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "57D24791-E798-4B08-A051-E880DEFB8268" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2758590C-67FD-4DD6-84C1-0D32264BBE5F" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0B0CF8A5-BC24-4204-BC06-2E1E2FB60E4D" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CDA723DB-62C5-4C84-B0BA-5313FDA49D73" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "92F08B96-D43E-407E-839C-4C3C5BB58B2B" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E50C779-C780-45FB-BC77-B9717389D2EB" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "867779A4-A7A5-48AD-9AC0-C6476719A5EE" } ], "operator": "OR" } ] } ]