Vulnerability Details : CVE-2011-1512
Potential exploit
Heap-based buffer overflow in xlssr.dll in Autonomy KeyView, as used in IBM Lotus Notes before 8.5.2 FP3, allows remote attackers to execute arbitrary code via a malformed BIFF record in a .xls Excel spreadsheet attachment, aka SPR PRAD8E3HKR.
Vulnerability category: OverflowExecute code
Products affected by CVE-2011-1512
- cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:4.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:4.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.10:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.11:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.9a:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.12:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.02:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.0.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.0.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.0.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.0.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.0.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.0.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.2:cf1:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.1:cf3:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.7:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.6a.01:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.4a:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.1:cf2:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.9:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.5.02:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.2a:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:4.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:4.6.7a:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.0.2.6:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.4.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.1b:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.1a:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:3.0.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.3.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.1:cf1:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.6a:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.2c:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.2b:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0a:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:4.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:4.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.4.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.2:cf2:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.8:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.7a:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.5.01:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.1.02:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:5.0.1c:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:4.6.7h:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:3.0.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.6.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:autonomy:keyview:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2011-1512
18.23%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2011-1512
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2011-1512
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2011-1512
-
http://www.securityfocus.com/archive/1/518120/100/0/threaded
SecurityFocus
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14203
Repository / Oval Repository
-
http://www.coresecurity.com/content/LotusNotes-XLS-viewer-heap-overflow
Lotus Notes XLS viewer malformed BIFF record heap overflow | Core SecurityExploit
-
http://securityreason.com/securityalert/8263
Lotus Notes XLS viewer malformed BIFF record heap overflow - CXSecurity.com
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/67619
IBM Lotus Notes xlssr.dll buffer overflow CVE-2011-1512 Vulnerability Report
-
http://secunia.com/advisories/44624
Sign inVendor Advisory
-
http://www.securityfocus.com/bid/47962
RETIRED: IBM Lotus Notes Attachment Handling Multiple Buffer Overflow Vulnerabilities
-
http://www.ibm.com/support/docview.wss?uid=swg21500034
IBM notice: The page you requested cannot be displayed
Jump to