exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
iDEFENSE Security Advisory 2011-05-24.4 https://packetstormsecurity.com/files/101713/05.24.11-4.txt https://packetstormsecurity.com/files/101713/05.24.11-4.txt https://packetstormsecurity.com/files/101713/iDEFENSE-Security-Advisory-2011-05-24.4.html Thu, 26 May 2011 02:07:41 GMT iDefense Security Advisory 05.24.11 - Remote exploitation of a stack buffer overflow vulnerability in IBM Corp.'s Lotus Notes could allow an attacker to execute arbitrary code in the context of the current user. <BR> <BR> The vulnerability occurs during the processing of tag information contained within an Applix document. A memory copy operation within a loop may cause tag data to overflow the bounds of a stack buffer. This condition may lead to arbitrary code execution. Lotus Notes versions 6.0, 6.5, 7.0, 8.0, 8.5 are vulnerable.

Related Files

No related files
packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close