Vulnerability Name: | CVE-2007-6706 (CCN-37361) | ||||||||
Assigned: | 2007-10-23 | ||||||||
Published: | 2007-10-23 | ||||||||
Updated: | 2011-03-08 | ||||||||
Summary: | Unspecified vulnerability in nlnotes.dll in the client in IBM Lotus Notes 6.5, 7.0.x before 7.0.2 CCH or 7.0.3, and possibly 8.0 allows remote attackers to execute arbitrary code via crafted text in an e-mail message sent over SMTP. | ||||||||
CVSS v3 Severity: | 2.9 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:N/A:N)
| ||||||||
CVSS v2 Severity: | 9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C) 6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
0.9 Low (CCN Temporal CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
| ||||||||
Vulnerability Type: | CWE-94 | ||||||||
Vulnerability Consequences: | Obtain Information | ||||||||
References: | Source: MITRE Type: CNA CVE-2007-5544 Source: MITRE Type: CNA CVE-2007-6706 Source: OSVDB Type: UNKNOWN 40956 Source: CCN Type: SA27279 IBM Lotus Notes Multiple Vulnerabilities Source: SECUNIA Type: Vendor Advisory 27279 Source: CCN Type: SA27321 IBM Lotus Domino Multiple Vulnerabilities Source: CCN Type: SECTRACK ID: 1019464 IBM Lotus Notes SMTP Message Processing Bug Lets Remote Users Execute Arbitrary Code Source: SECTRACK Type: UNKNOWN 1019464 Source: CCN Type: IBM Technote (FAQ) 1257030 Potential vulnerability in Notes/Domino memory mapped files Source: CONFIRM Type: UNKNOWN http://www-1.ibm.com/support/docview.wss?uid=swg21271957 Source: CCN Type: OSVDB ID: 40948 IBM Lotus Notes / Domino IPC Shared Memory Permission Weakness Local Privilege Escalation Source: CCN Type: OSVDB ID: 40956 IBM Lotus Notes nlnotes.dll SMTP Message Handling Remote Code Execution Source: CCN Type: BID-26146 Lotus Domino Memory Mapped Files Arbitrary Access Vulnerability Source: CCN Type: SYMSA-2007-013 Lotus Notes Memory Mapped Files Vulnerability Source: VUPEN Type: UNKNOWN ADV-2007-3597 Source: XF Type: UNKNOWN lotus-notesdomino-insecure-permissions(37361) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: ![]() | ||||||||
BACK |