2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2006-0121" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2006-01-09T11:03:00.000" ,
2024-11-22 01:07:11 +00:00
"lastModified" : "2024-11-21T00:05:41.850" ,
2023-04-24 12:24:31 +02:00
"vulnStatus" : "Modified" ,
2024-12-08 03:06:42 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Multiple memory leaks in IBM Lotus Notes and Domino Server before 6.5.5 allow attackers to cause a denial of service (memory consumption and crash) via unknown vectors related to (1) unspecified vectors during the SSL handshake (SPR# MKIN67MQVW), (2) the stash file during the SSL handshake (SPR# MKIN693QUT), and possibly other vectors. NOTE: due to insufficient information in the original vendor advisory, it is not clear whether there is an attacker role in other memory leaks that are specified in the advisory."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:N/I:N/A:C" ,
2024-11-22 01:07:11 +00:00
"baseScore" : 7.8 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "NONE" ,
"integrityImpact" : "NONE" ,
2024-11-22 01:07:11 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.9 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_domino:6.5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0766C3F9-D2A2-4A58-9FF7-11B57232DEA0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_domino:6.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "C00B8057-26DF-4064-A934-0AA88A0C1A6F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_domino:6.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8EFA5487-2D61-4E61-98A3-51882A8CE0C4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_domino:6.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A95404CC-47B8-40C6-BCED-FC3E68CA8D8F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_domino:6.5.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "8F342FD1-7A60-4E7D-B56A-E1C3D560C728"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_domino:6.5.4:*:fp1:*:*:*:*:*" ,
"matchCriteriaId" : "99E2CC18-4049-470A-B6DB-580C65FED0A0"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_domino:6.5.4:*:fp2:*:*:*:*:*" ,
"matchCriteriaId" : "2396543F-1507-493C-B57F-3082D6E68894"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_domino_enterprise_server:6.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "40882B15-23A7-456C-B4DB-B1C7246BBC28"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_domino_enterprise_server:6.5.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "9D3195CA-CB62-4AEF-AC8C-C985A372FD89"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1360A50E-C1E1-4690-874A-04CC7C1A77CC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D94927A9-61FD-459F-9A6D-E581A4AF505C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D3B32BA2-9EB7-4294-A857-226A5B1CC401"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EF64CA16-6C20-42E1-BA68-BD63A873BFA9"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "12D7DD7B-CA90-44A5-9B7B-4A4985150689"
}
]
}
]
}
] ,
"references" : [
2023-11-07 21:03:21 +00:00
{
"url" : "http://secunia.com/advisories/18328" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
2023-04-24 12:24:31 +02:00
{
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg27007054" ,
"source" : "cve@mitre.org"
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/20f66e356a76c90f8525702a00420e08?OpenDocument&Highlight=0%2CMKIN67MQVW" ,
2023-04-24 12:24:31 +02:00
"source" : "cve@mitre.org"
} ,
{
2023-11-07 21:03:21 +00:00
"url" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/2221243535d88a2b8525701b00420cd6?OpenDocument&Highlight=0%2CMKIN693QUT" ,
2023-04-24 12:24:31 +02:00
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/16158" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/0081" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24223" ,
"source" : "cve@mitre.org"
2024-11-22 01:07:11 +00:00
} ,
{
"url" : "http://secunia.com/advisories/18328" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www-1.ibm.com/support/docview.wss?uid=swg27007054" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/20f66e356a76c90f8525702a00420e08?OpenDocument&Highlight=0%2CMKIN67MQVW" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/2221243535d88a2b8525701b00420cd6?OpenDocument&Highlight=0%2CMKIN693QUT" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/16158" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch"
]
} ,
{
"url" : "http://www.vupen.com/english/advisories/2006/0081" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/24223" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}