A successful attack could possibly result in the ability to execute arbitrary code with System privileges on the target server. ![]() A remote, unauthenticated attacker can exploit this vulnerability by sending an email containing a crafted BMP image to the target server. ![]() This could potentially lead to an undersized buffer being allocated. The vulnerability is due to improper bounds checking when parsing a BMP image with crafted dimensions. ![]() IBM Domino prior to 8.5.3 Fix Pack 6 Interim Fix 7 IBM Domino prior to 9.0.1 Fix Pack 3 Interim Fix 3 IBM Notes And Domino 8.5.3 Fix Pack 6 (plus Interim Fixes) and prior IBM Notes And Domino 9.0.1 Fix Pack 3 (plus Interim Fixes) and priorĪn integer overflow vulnerability has been reported in IBM Lotus Domino.
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |