mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
187 lines
7.1 KiB
JSON
187 lines
7.1 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "cve@mitre.org",
|
|
"ID": "CVE-2005-2618",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "n/a",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "n/a"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allow remote attackers to execute arbitrary code via (1) a UUE file containing an encoded file with a long filename handled by uudrdr.dll, (2) a compressed ZIP file with a long filename handled by kvarcve.dll, (3) a TAR archive with a long filename that is extracted to a directory with a long path handled by the TAR reader (tarrdr.dll), (4) an email that contains a long HTTP, FTP, or // link handled by the HTML speed reader (htmsr.dll) or (5) an email containing a crafted long link handled by the HTML speed reader (htmsr.dll)."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "n/a"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "lotus-kvarcve-filename-bo(24635)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24635"
|
|
},
|
|
{
|
|
"name": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918",
|
|
"refsource": "CONFIRM",
|
|
"url": "http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918"
|
|
},
|
|
{
|
|
"name": "http://secunia.com/secunia_research/2005-34/advisory/",
|
|
"refsource": "MISC",
|
|
"url": "http://secunia.com/secunia_research/2005-34/advisory/"
|
|
},
|
|
{
|
|
"name": "23067",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/23067"
|
|
},
|
|
{
|
|
"name": "lotus-uudrdr-uue-bo(24636)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24636"
|
|
},
|
|
{
|
|
"name": "ADV-2006-0500",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/0500"
|
|
},
|
|
{
|
|
"name": "ADV-2006-0501",
|
|
"refsource": "VUPEN",
|
|
"url": "http://www.vupen.com/english/advisories/2006/0501"
|
|
},
|
|
{
|
|
"name": "20060210 Secunia Research: Lotus Notes ZIP File Handling Buffer Overflow",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/424626/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "23064",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/23064"
|
|
},
|
|
{
|
|
"name": "23066",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/23066"
|
|
},
|
|
{
|
|
"name": "1015657",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://securitytracker.com/id?1015657"
|
|
},
|
|
{
|
|
"name": "http://secunia.com/secunia_research/2005-36/advisory/",
|
|
"refsource": "MISC",
|
|
"url": "http://secunia.com/secunia_research/2005-36/advisory/"
|
|
},
|
|
{
|
|
"name": "23065",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/23065"
|
|
},
|
|
{
|
|
"name": "16576",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/16576"
|
|
},
|
|
{
|
|
"name": "20060210 Secunia Research: Lotus Notes UUE File Handling Buffer Overflow",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/424689/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "16100",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16100"
|
|
},
|
|
{
|
|
"name": "lotus-htmsr-link-bo(24639)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24639"
|
|
},
|
|
{
|
|
"name": "lotus-tarrdr-filename-bo(24638)",
|
|
"refsource": "XF",
|
|
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24638"
|
|
},
|
|
{
|
|
"name": "http://secunia.com/secunia_research/2005-32/advisory/",
|
|
"refsource": "MISC",
|
|
"url": "http://secunia.com/secunia_research/2005-32/advisory/"
|
|
},
|
|
{
|
|
"name": "VU#884076",
|
|
"refsource": "CERT-VN",
|
|
"url": "http://www.kb.cert.org/vuls/id/884076"
|
|
},
|
|
{
|
|
"name": "http://secunia.com/secunia_research/2005-66/advisory/",
|
|
"refsource": "MISC",
|
|
"url": "http://secunia.com/secunia_research/2005-66/advisory/"
|
|
},
|
|
{
|
|
"name": "20060210 Secunia Research: Lotus Notes HTML Speed Reader Link BufferOverflows",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/424692/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "16280",
|
|
"refsource": "SECUNIA",
|
|
"url": "http://secunia.com/advisories/16280"
|
|
},
|
|
{
|
|
"name": "23068",
|
|
"refsource": "OSVDB",
|
|
"url": "http://www.osvdb.org/23068"
|
|
},
|
|
{
|
|
"name": "20060210 Secunia Research: Lotus Notes TAR Reader File Extraction BufferOverflow",
|
|
"refsource": "BUGTRAQ",
|
|
"url": "http://www.securityfocus.com/archive/1/424666/100/0/threaded"
|
|
},
|
|
{
|
|
"name": "http://secunia.com/secunia_research/2005-37/advisory/",
|
|
"refsource": "MISC",
|
|
"url": "http://secunia.com/secunia_research/2005-37/advisory/"
|
|
}
|
|
]
|
|
}
|
|
} |