Vulnerability Details : CVE-2010-0919
Stack-based buffer overflow in the Lotus Domino Web Access ActiveX control in IBM Lotus iNotes (aka Domino Web Access or DWA) 6.5, 7.0 before 7.0.4, 8.0, 8.0.2, and before 229.281 for Domino 8.0.2 FP4 allows remote attackers to execute arbitrary code via a long URL argument to an unspecified method, aka PRAD7JTNHJ.
Vulnerability category: OverflowExecute code
Products affected by CVE-2010-0919
- cpe:2.3:a:ibm:domino_web_access:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:domino_web_access:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:domino_web_access:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:domino_web_access:8.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:domino_web_access:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:domino_web_access:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:domino_web_access:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:*:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.021:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.011:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.041:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.031:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.101:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.061:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.051:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.191:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.181:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.211:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.201:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.131:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.111:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.171:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.161:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.221:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.151:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.141:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.241:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.261:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.251:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_inotes:229.231:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2010-0919
21.28%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2010-0919
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.6
|
HIGH | AV:N/AC:H/Au:N/C:C/I:C/A:C |
4.9
|
10.0
|
NIST |
CWE ids for CVE-2010-0919
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2010-0919
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/56555
Lotus iNotes ActiveX control buffer overflow CVE-2010-0919 Vulnerability Report
-
http://secunia.com/advisories/38744
Sign inVendor Advisory
-
http://securitytracker.com/id?1023662
IBM Lotus iNotes Buffer Overflow in ActiveX Control Lets Remote Users Execute Arbitrary Code - SecurityTracker
-
http://www.vupen.com/english/advisories/2010/0496
Webmail | OVH- OVHPatch;Vendor Advisory
-
http://www.vupen.com/english/advisories/2010/0495
Webmail | OVH- OVHVendor Advisory
-
http://secunia.com/advisories/38681
Sign inVendor Advisory
-
http://www-01.ibm.com/support/docview.wss?uid=swg21421808
IBM notice: The page you requested cannot be displayedVendor Advisory
-
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=857
-
http://www-01.ibm.com/support/docview.wss?uid=swg27018109
Lotus iNotes Interim Fix 229.281 for Domino 8.0.2 Fix Pack 4Vendor Advisory
-
http://www.securityfocus.com/bid/38459
IBM Domino Web Access Prior to 229.281 Unspecified Security Vulnerabilities
-
http://www.osvdb.org/62612
404 Not Found
-
http://www.securityfocus.com/bid/38457
Domino Web Access ActiveX Control URL Handling Buffer Overflow Vulnerability
-
http://secunia.com/advisories/38755
Sign inVendor Advisory
Jump to