Lucene search

K
nvd[email protected]NVD:CVE-2011-1216
HistoryMay 31, 2011 - 8:55 p.m.

CVE-2011-1216

2011-05-3120:55:02
CWE-119
web.nvd.nist.gov
1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

Low

0.301 Low

EPSS

Percentile

97.0%

Stack-based buffer overflow in assr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via crafted tag data in an Applix spreadsheet attachment, aka SPR PRAD8823A7.

Affected configurations

NVD
Node
ibmlotus_notesRange8.5.2.2
OR
ibmlotus_notesMatch3.0
OR
ibmlotus_notesMatch3.0.0.1
OR
ibmlotus_notesMatch3.0.0.2
OR
ibmlotus_notesMatch4.2
OR
ibmlotus_notesMatch4.2.1
OR
ibmlotus_notesMatch4.2.2
OR
ibmlotus_notesMatch4.5
OR
ibmlotus_notesMatch4.6
OR
ibmlotus_notesMatch4.6.7a
OR
ibmlotus_notesMatch4.6.7h
OR
ibmlotus_notesMatch5.0
OR
ibmlotus_notesMatch5.0.1
OR
ibmlotus_notesMatch5.0.1.02
OR
ibmlotus_notesMatch5.0.1a
OR
ibmlotus_notesMatch5.0.1b
OR
ibmlotus_notesMatch5.0.1c
OR
ibmlotus_notesMatch5.0.2
OR
ibmlotus_notesMatch5.0.2a
OR
ibmlotus_notesMatch5.0.2b
OR
ibmlotus_notesMatch5.0.2c
OR
ibmlotus_notesMatch5.0.3
OR
ibmlotus_notesMatch5.0.4
OR
ibmlotus_notesMatch5.0.4a
OR
ibmlotus_notesMatch5.0.5
OR
ibmlotus_notesMatch5.0.5.01
OR
ibmlotus_notesMatch5.0.5.02
OR
ibmlotus_notesMatch5.0.6
OR
ibmlotus_notesMatch5.0.6a
OR
ibmlotus_notesMatch5.0.6a.01
OR
ibmlotus_notesMatch5.0.7
OR
ibmlotus_notesMatch5.0.7a
OR
ibmlotus_notesMatch5.0.8
OR
ibmlotus_notesMatch5.0.9
OR
ibmlotus_notesMatch5.0.9a
OR
ibmlotus_notesMatch5.0.10
OR
ibmlotus_notesMatch5.0.11
OR
ibmlotus_notesMatch5.0.12
OR
ibmlotus_notesMatch5.0a
OR
ibmlotus_notesMatch5.02
OR
ibmlotus_notesMatch6.0
OR
ibmlotus_notesMatch6.0.1
OR
ibmlotus_notesMatch6.0.1cf1
OR
ibmlotus_notesMatch6.0.1cf2
OR
ibmlotus_notesMatch6.0.1cf3
OR
ibmlotus_notesMatch6.0.2
OR
ibmlotus_notesMatch6.0.2cf1
OR
ibmlotus_notesMatch6.0.2cf2
OR
ibmlotus_notesMatch6.0.2.2
OR
ibmlotus_notesMatch6.0.3
OR
ibmlotus_notesMatch6.0.4
OR
ibmlotus_notesMatch6.0.5
OR
ibmlotus_notesMatch6.5
OR
ibmlotus_notesMatch6.5.1
OR
ibmlotus_notesMatch6.5.2
OR
ibmlotus_notesMatch6.5.3
OR
ibmlotus_notesMatch6.5.3.1
OR
ibmlotus_notesMatch6.5.4
OR
ibmlotus_notesMatch6.5.4.1
OR
ibmlotus_notesMatch6.5.4.2
OR
ibmlotus_notesMatch6.5.4.3
OR
ibmlotus_notesMatch6.5.5
OR
ibmlotus_notesMatch6.5.5.1
OR
ibmlotus_notesMatch6.5.5.2
OR
ibmlotus_notesMatch6.5.5.3
OR
ibmlotus_notesMatch6.5.6
OR
ibmlotus_notesMatch6.5.6.1
OR
ibmlotus_notesMatch6.5.6.2
OR
ibmlotus_notesMatch6.5.6.3
OR
ibmlotus_notesMatch7.0
OR
ibmlotus_notesMatch7.0.0
OR
ibmlotus_notesMatch7.0.1
OR
ibmlotus_notesMatch7.0.1.1
OR
ibmlotus_notesMatch7.0.2
OR
ibmlotus_notesMatch7.0.2.1
OR
ibmlotus_notesMatch7.0.2.2
OR
ibmlotus_notesMatch7.0.2.3
OR
ibmlotus_notesMatch7.0.3
OR
ibmlotus_notesMatch7.0.3.1
OR
ibmlotus_notesMatch7.0.4
OR
ibmlotus_notesMatch7.0.4.0
OR
ibmlotus_notesMatch7.0.4.1
OR
ibmlotus_notesMatch7.0.4.2
OR
ibmlotus_notesMatch8.0
OR
ibmlotus_notesMatch8.0.0
OR
ibmlotus_notesMatch8.0.1
OR
ibmlotus_notesMatch8.0.2
OR
ibmlotus_notesMatch8.0.2.0
OR
ibmlotus_notesMatch8.0.2.1
OR
ibmlotus_notesMatch8.0.2.2
OR
ibmlotus_notesMatch8.0.2.3
OR
ibmlotus_notesMatch8.0.2.4
OR
ibmlotus_notesMatch8.0.2.5
OR
ibmlotus_notesMatch8.0.2.6
OR
ibmlotus_notesMatch8.5
OR
ibmlotus_notesMatch8.5.0.0
OR
ibmlotus_notesMatch8.5.0.1
OR
ibmlotus_notesMatch8.5.1
OR
ibmlotus_notesMatch8.5.1.0
OR
ibmlotus_notesMatch8.5.1.1
OR
ibmlotus_notesMatch8.5.1.2
OR
ibmlotus_notesMatch8.5.1.3
OR
ibmlotus_notesMatch8.5.1.4
OR
ibmlotus_notesMatch8.5.1.5
OR
ibmlotus_notesMatch8.5.2.0
OR
ibmlotus_notesMatch8.5.2.1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.8 High

AI Score

Confidence

Low

0.301 Low

EPSS

Percentile

97.0%