Lucene search

K
nvd[email protected]NVD:CVE-2011-1217
HistoryMay 31, 2011 - 8:55 p.m.

CVE-2011-1217

2011-05-3120:55:02
CWE-119
web.nvd.nist.gov

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.5 High

AI Score

Confidence

Low

0.455 Medium

EPSS

Percentile

97.4%

Buffer overflow in kpprzrdr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a crafted .prz attachment. NOTE: some of these details are obtained from third party information.

Affected configurations

NVD
Node
ibmlotus_notesRange8.5.2.2
OR
ibmlotus_notesMatch3.0
OR
ibmlotus_notesMatch3.0.0.1
OR
ibmlotus_notesMatch3.0.0.2
OR
ibmlotus_notesMatch4.2
OR
ibmlotus_notesMatch4.2.1
OR
ibmlotus_notesMatch4.2.2
OR
ibmlotus_notesMatch4.5
OR
ibmlotus_notesMatch4.6
OR
ibmlotus_notesMatch4.6.7a
OR
ibmlotus_notesMatch4.6.7h
OR
ibmlotus_notesMatch5.0
OR
ibmlotus_notesMatch5.0.1
OR
ibmlotus_notesMatch5.0.1.02
OR
ibmlotus_notesMatch5.0.1a
OR
ibmlotus_notesMatch5.0.1b
OR
ibmlotus_notesMatch5.0.1c
OR
ibmlotus_notesMatch5.0.2
OR
ibmlotus_notesMatch5.0.2a
OR
ibmlotus_notesMatch5.0.2b
OR
ibmlotus_notesMatch5.0.2c
OR
ibmlotus_notesMatch5.0.3
OR
ibmlotus_notesMatch5.0.4
OR
ibmlotus_notesMatch5.0.4a
OR
ibmlotus_notesMatch5.0.5
OR
ibmlotus_notesMatch5.0.5.01
OR
ibmlotus_notesMatch5.0.5.02
OR
ibmlotus_notesMatch5.0.6
OR
ibmlotus_notesMatch5.0.6a
OR
ibmlotus_notesMatch5.0.6a.01
OR
ibmlotus_notesMatch5.0.7
OR
ibmlotus_notesMatch5.0.7a
OR
ibmlotus_notesMatch5.0.8
OR
ibmlotus_notesMatch5.0.9
OR
ibmlotus_notesMatch5.0.9a
OR
ibmlotus_notesMatch5.0.10
OR
ibmlotus_notesMatch5.0.11
OR
ibmlotus_notesMatch5.0.12
OR
ibmlotus_notesMatch5.0a
OR
ibmlotus_notesMatch5.02
OR
ibmlotus_notesMatch6.0
OR
ibmlotus_notesMatch6.0.1
OR
ibmlotus_notesMatch6.0.1cf1
OR
ibmlotus_notesMatch6.0.1cf2
OR
ibmlotus_notesMatch6.0.1cf3
OR
ibmlotus_notesMatch6.0.2
OR
ibmlotus_notesMatch6.0.2cf1
OR
ibmlotus_notesMatch6.0.2cf2
OR
ibmlotus_notesMatch6.0.2.2
OR
ibmlotus_notesMatch6.0.3
OR
ibmlotus_notesMatch6.0.4
OR
ibmlotus_notesMatch6.0.5
OR
ibmlotus_notesMatch6.5
OR
ibmlotus_notesMatch6.5.1
OR
ibmlotus_notesMatch6.5.2
OR
ibmlotus_notesMatch6.5.3
OR
ibmlotus_notesMatch6.5.3.1
OR
ibmlotus_notesMatch6.5.4
OR
ibmlotus_notesMatch6.5.4.1
OR
ibmlotus_notesMatch6.5.4.2
OR
ibmlotus_notesMatch6.5.4.3
OR
ibmlotus_notesMatch6.5.5
OR
ibmlotus_notesMatch6.5.5.1
OR
ibmlotus_notesMatch6.5.5.2
OR
ibmlotus_notesMatch6.5.5.3
OR
ibmlotus_notesMatch6.5.6
OR
ibmlotus_notesMatch6.5.6.1
OR
ibmlotus_notesMatch6.5.6.2
OR
ibmlotus_notesMatch6.5.6.3
OR
ibmlotus_notesMatch7.0
OR
ibmlotus_notesMatch7.0.0
OR
ibmlotus_notesMatch7.0.1
OR
ibmlotus_notesMatch7.0.1.1
OR
ibmlotus_notesMatch7.0.2
OR
ibmlotus_notesMatch7.0.2.1
OR
ibmlotus_notesMatch7.0.2.2
OR
ibmlotus_notesMatch7.0.2.3
OR
ibmlotus_notesMatch7.0.3
OR
ibmlotus_notesMatch7.0.3.1
OR
ibmlotus_notesMatch7.0.4
OR
ibmlotus_notesMatch7.0.4.0
OR
ibmlotus_notesMatch7.0.4.1
OR
ibmlotus_notesMatch7.0.4.2
OR
ibmlotus_notesMatch8.0
OR
ibmlotus_notesMatch8.0.0
OR
ibmlotus_notesMatch8.0.1
OR
ibmlotus_notesMatch8.0.2
OR
ibmlotus_notesMatch8.0.2.0
OR
ibmlotus_notesMatch8.0.2.1
OR
ibmlotus_notesMatch8.0.2.2
OR
ibmlotus_notesMatch8.0.2.3
OR
ibmlotus_notesMatch8.0.2.4
OR
ibmlotus_notesMatch8.0.2.5
OR
ibmlotus_notesMatch8.0.2.6
OR
ibmlotus_notesMatch8.5
OR
ibmlotus_notesMatch8.5.0.0
OR
ibmlotus_notesMatch8.5.0.1
OR
ibmlotus_notesMatch8.5.1
OR
ibmlotus_notesMatch8.5.1.0
OR
ibmlotus_notesMatch8.5.1.1
OR
ibmlotus_notesMatch8.5.1.2
OR
ibmlotus_notesMatch8.5.1.3
OR
ibmlotus_notesMatch8.5.1.4
OR
ibmlotus_notesMatch8.5.1.5
OR
ibmlotus_notesMatch8.5.2.0
OR
ibmlotus_notesMatch8.5.2.1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.5 High

AI Score

Confidence

Low

0.455 Medium

EPSS

Percentile

97.4%