← Back to CVEs
CVE-2011-1389
N/ADescription
Multiple directory traversal vulnerabilities in the vendor daemon in Rational Common Licensing in Telelogic License Server 2.0, Rational License Server 7.x, and ibmratl in IBM Rational License Key Server (RLKS) 8.0 through 8.1.2 allow remote attackers to execute arbitrary code via vectors related to save, rename, and load operations on log files. NOTE: this might overlap CVE-2011-4135.
CVE Details
CVSS v3.1 ScoreN/A
Published1/19/2012
Last Modified4/11/2025
Sourcenvd
Honeypot Sightings0
Affected Products
ibm:rational_license_key_serveribm:rational_license_serveribm:telelogic_license_server
Weaknesses (CWE)
CWE-22
References
http://kb.flexerasoftware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=Q200975&sliceId=1(cve@mitre.org)
http://secunia.com/advisories/47522(cve@mitre.org)
http://secunia.com/advisories/47524(cve@mitre.org)
http://www.flexerasoftware.com/pl/13057.htm(cve@mitre.org)
http://www.ibm.com/support/docview.wss?uid=swg21577760(cve@mitre.org)
http://www.securityfocus.com/bid/49191(cve@mitre.org)
http://www.zerodayinitiative.com/advisories/ZDI-11-272/(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/71739(cve@mitre.org)
http://kb.flexerasoftware.com/selfservice/microsites/search.do?cmd=displayKC&docType=kc&externalId=Q200975&sliceId=1(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/47522(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/47524(af854a3a-2127-422b-91ae-364da2661108)
http://www.flexerasoftware.com/pl/13057.htm(af854a3a-2127-422b-91ae-364da2661108)
http://www.ibm.com/support/docview.wss?uid=swg21577760(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/49191(af854a3a-2127-422b-91ae-364da2661108)
http://www.zerodayinitiative.com/advisories/ZDI-11-272/(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/71739(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.