Stack-based buffer overflow in the Lotus Domino Web Access ActiveX control in IBM Lotus iNotes (aka Domino Web Access or DWA) 6.5, 7.0 before 7.0.4, 8.0, 8.0.2, and before 229.281 for Domino 8.0.2 FP4 allows remote attackers to execute arbitrary code via a long URL argument to an unspecified method, aka PRAD7JTNHJ.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
https://exchange.xforce.ibmcloud.com/vulnerabilities/56555 | vdb entry |
http://www.osvdb.org/62612 | vdb entry |
http://securitytracker.com/id?1023662 | vdb entry |
http://www-01.ibm.com/support/docview.wss?uid=swg21421808 | vendor advisory |
http://www.vupen.com/english/advisories/2010/0496 | patch vendor advisory vdb entry |
http://www.securityfocus.com/bid/38459 | vdb entry |
http://secunia.com/advisories/38755 | third party advisory vendor advisory |
http://secunia.com/advisories/38744 | third party advisory vendor advisory |
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=857 | third party advisory |
http://www-01.ibm.com/support/docview.wss?uid=swg27018109 | vendor advisory |
http://www.securityfocus.com/bid/38457 | vdb entry |
http://secunia.com/advisories/38681 | third party advisory vendor advisory |
http://www.vupen.com/english/advisories/2010/0495 | vdb entry vendor advisory |