CVE-2012-3301
Published Aug 21, 2012
Last updated 7 years ago
Overview
- Description
- Multiple CRLF injection vulnerabilities in the HTTP server in IBM Lotus Domino 8.5.x before 8.5.4 allow remote attackers to inject arbitrary HTTP headers and conduct HTTP response splitting attacks via crafted input involving (1) Mozilla Firefox 3.0.9 and earlier or (2) unspecified browsers.
- Source
- psirt@us.ibm.com
- NVD status
- Modified
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 4.3
- Impact score
- 2.9
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:N/I:P/A:N
Weaknesses
- nvd@nist.gov
- CWE-20
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A1588F54-4E8B-43C3-85E5-A12C04B694CD" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B6DDD0E9-9084-4F0A-B3F1-8357CAD88A3E" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "ECF00AEE-9A3A-46E3-8B0F-2131E3235431" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9861BE52-4945-4F36-B6EF-701DB789CA28" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D6BFA82-5CA0-403F-98E6-342EF87AE366" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "79CBA8AF-9C3D-4510-8D91-7C42931CD3FF" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6DB694E3-96E1-4283-8DE3-91E930F76A65" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDB2B497-83A2-41A4-9F0D-CD17080CC1DA" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "91D7FA80-1FD9-48F3-934A-FC7B3BAD4FD6" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E30C8593-884E-4F6B-B107-0B3276EB1102" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.2.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A5B5CCB4-BB4F-4677-A7AA-B7C20682A00D" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.2.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2408220F-FBDB-419E-8F04-35BED47CE213" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "350ACC22-669F-4429-A525-36F56EF9678C" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3C068055-FB7A-4AFB-AF29-28238ECF126F" }, { "criteria": "cpe:2.3:a:ibm:lotus_domino:8.5.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1ACB4B2C-CCE1-4A0A-B962-B8C208869589" } ], "operator": "OR" } ] } ]