← Voltar para CVEs
CVE-2010-3407
N/ADescricao
Stack-based buffer overflow in the MailCheck821Address function in nnotes.dll in the nrouter.exe service in the server in IBM Lotus Domino 8.0.x before 8.0.2 FP5 and 8.5.x before 8.5.1 FP2 allows remote attackers to execute arbitrary code via a long e-mail address in an ORGANIZER:mailto header in an iCalendar calendar-invitation e-mail message, aka SPR NRBY7ZPJ9V.
Detalhes CVE
Pontuacao CVSS v3.1N/A
Publicado9/16/2010
Ultima modificacao4/29/2026
Fontenvd
Avistamentos honeypot0
Produtos afetados
ibm:lotus_domino
Fraquezas (CWE)
CWE-119
Referencias
http://labs.mwrinfosecurity.com/files/Advisories/mwri_lotus-domino-ical-stack-overflow_2010-09-14.pdf(cve@mitre.org)
http://secunia.com/advisories/41433(cve@mitre.org)
http://securitytracker.com/id?1024448(cve@mitre.org)
http://www-01.ibm.com/support/docview.wss?uid=swg21446515(cve@mitre.org)
http://www-10.lotus.com/ldd/r5fixlist.nsf/8d1c0550e6242b69852570c900549a74/52f9218288b51dcb852576c600741f72?OpenDocument(cve@mitre.org)
http://www-10.lotus.com/ldd/r5fixlist.nsf/8d1c0550e6242b69852570c900549a74/613a204806e3f211852576e2006afa3d?OpenDocument(cve@mitre.org)
http://www-10.lotus.com/ldd/r5fixlist.nsf/8d1c0550e6242b69852570c900549a74/af36678d60bd74288525778400534d7c?OpenDocument(cve@mitre.org)
http://www.exploit-db.com/exploits/15005(cve@mitre.org)
http://www.securityfocus.com/archive/1/513706/100/0/threaded(cve@mitre.org)
http://www.securityfocus.com/bid/43219(cve@mitre.org)
http://www.vupen.com/english/advisories/2010/2381(cve@mitre.org)
http://www.zerodayinitiative.com/advisories/ZDI-10-177/(cve@mitre.org)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61790(cve@mitre.org)
http://labs.mwrinfosecurity.com/advisories/lotus_domino_ical_stack_buffer_overflow/(af854a3a-2127-422b-91ae-364da2661108)
http://labs.mwrinfosecurity.com/files/Advisories/mwri_lotus-domino-ical-stack-overflow_2010-09-14.pdf(af854a3a-2127-422b-91ae-364da2661108)
http://secunia.com/advisories/41433(af854a3a-2127-422b-91ae-364da2661108)
http://securitytracker.com/id?1024448(af854a3a-2127-422b-91ae-364da2661108)
http://www-01.ibm.com/support/docview.wss?uid=swg21446515(af854a3a-2127-422b-91ae-364da2661108)
http://www-10.lotus.com/ldd/r5fixlist.nsf/8d1c0550e6242b69852570c900549a74/52f9218288b51dcb852576c600741f72?OpenDocument(af854a3a-2127-422b-91ae-364da2661108)
http://www-10.lotus.com/ldd/r5fixlist.nsf/8d1c0550e6242b69852570c900549a74/613a204806e3f211852576e2006afa3d?OpenDocument(af854a3a-2127-422b-91ae-364da2661108)
http://www-10.lotus.com/ldd/r5fixlist.nsf/8d1c0550e6242b69852570c900549a74/af36678d60bd74288525778400534d7c?OpenDocument(af854a3a-2127-422b-91ae-364da2661108)
http://www.exploit-db.com/exploits/15005(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/archive/1/513706/100/0/threaded(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/43219(af854a3a-2127-422b-91ae-364da2661108)
http://www.vupen.com/english/advisories/2010/2381(af854a3a-2127-422b-91ae-364da2661108)
http://www.zerodayinitiative.com/advisories/ZDI-10-177/(af854a3a-2127-422b-91ae-364da2661108)
https://exchange.xforce.ibmcloud.com/vulnerabilities/61790(af854a3a-2127-422b-91ae-364da2661108)
Correlacoes IOC
Sem correlacoes registradas
This product uses data from the NVD API but is not endorsed or certified by the NVD.