vendor:
Lotus Domino
by:
Author name not mentioned
9
CVSS
CRITICAL
Remote stack-based buffer overflow
119
CWE
Product Name: Lotus Domino
Affected Version From: Lotus Domino 8.5.2
Affected Version To: Other versions may also be affected
Patch Exists: NO
Related CWE: CVE not mentioned
CPE: a:ibm:lotus_domino:8.5.2
Metasploit:
https://www.rapid7.com/db/vulnerabilities/freebsd-cve-2022-23499/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2022-3643/, https://www.rapid7.com/db/vulnerabilities/ubuntu-cve-2022-3643/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2022-3643/, https://www.rapid7.com/db/vulnerabilities/amazon_linux-cve-2022-3643/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2022-3643/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2022-3172/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2021-20325/, https://www.rapid7.com/db/vulnerabilities/oracle_linux-cve-2021-20325/, https://www.rapid7.com/db/vulnerabilities/centos_linux-cve-2021-20325/, https://www.rapid7.com/db/vulnerabilities/redhat_linux-cve-2021-20325/, https://www.rapid7.com/db/vulnerabilities/debian-cve-2021-37698/, https://www.rapid7.com/db/vulnerabilities/suse-cve-2021-37698/, https://www.rapid7.com/db/vulnerabilities/amazon-linux-ami-2-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/oracle-solaris-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp2-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/alma_linux-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp9-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/redhat-openshift-cve-2020-25686/, https://www.rapid7.com/db/vulnerabilities/huawei-euleros-2_0_sp3-cve-2020-25686/, https://www.rapid7.com/db/?q=CVE+not+mentioned&type=&page=2, https://www.rapid7.com/db/?q=CVE+not+mentioned&type=&page=3, https://www.rapid7.com/db/?q=CVE+not+mentioned&type=&page=2
Platforms Tested:
2011
Remote Stack-Based Buffer Overflow Vulnerability in IBM Lotus Domino
The vulnerability exists due to a failure in performing adequate boundary checks on user-supplied input. A remote attacker can exploit this vulnerability by sending a specially crafted request to the affected server, which could lead to the execution of arbitrary code with system-level privileges. Successful exploitation of this vulnerability would completely compromise the affected computers. Failed exploit attempts may result in a denial-of-service condition.
Mitigation:
It is recommended to apply the latest updates and patches provided by IBM to address this vulnerability.