FKIE_CVE-2008-1965

Vulnerability from fkie_nvd - Published: 2008-04-25 19:05 - Updated: 2025-04-09 00:30
Severity ?
Summary
Argument injection vulnerability in the cai: URI handler in rcplauncher in IBM Lotus Expeditor Client for Desktop 6.1.1 and 6.1.2, as used by Lotus Symphony and possibly other products, allows remote attackers to execute arbitrary code by injecting a -launcher option via a cai: URI, as demonstrated by a reference to a UNC share pathname.
References
cve@mitre.orghttp://archives.neohapsis.com/archives/fulldisclosure/2008-04/0640.htmlExploit
cve@mitre.orghttp://secunia.com/advisories/29958
cve@mitre.orghttp://thomas.pollet.googlepages.com/lotusexpeditorurihandlervulnerability
cve@mitre.orghttp://www-1.ibm.com/support/docview.wss?uid=swg21303813
cve@mitre.orghttp://www.securityfocus.com/archive/1/491343/100/0/threaded
cve@mitre.orghttp://www.securityfocus.com/bid/28926Exploit
cve@mitre.orghttp://www.securitytracker.com/id?1019951
cve@mitre.orghttp://www.securitytracker.com/id?1019952
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/1394/references
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/41990
af854a3a-2127-422b-91ae-364da2661108http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0640.htmlExploit
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29958
af854a3a-2127-422b-91ae-364da2661108http://thomas.pollet.googlepages.com/lotusexpeditorurihandlervulnerability
af854a3a-2127-422b-91ae-364da2661108http://www-1.ibm.com/support/docview.wss?uid=swg21303813
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/491343/100/0/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/28926Exploit
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019951
af854a3a-2127-422b-91ae-364da2661108http://www.securitytracker.com/id?1019952
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/1394/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/41990
Impacted products

{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:lotus_expeditor_client:6.1.1:*:desktop:*:*:*:*:*",
              "matchCriteriaId": "FDC09505-8217-4996-AF4F-874626279504",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:lotus_expeditor_client:6.1.2:*:desktop:*:*:*:*:*",
              "matchCriteriaId": "78F117CA-5D38-4A48-B348-A774E79BBB7D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:lotus_symphany:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "C57B6093-72BE-49CC-A784-60CAE8C0FEBD",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Argument injection vulnerability in the cai: URI handler in rcplauncher in IBM Lotus Expeditor Client for Desktop 6.1.1 and 6.1.2, as used by Lotus Symphony and possibly other products, allows remote attackers to execute arbitrary code by injecting a -launcher option via a cai: URI, as demonstrated by a reference to a UNC share pathname."
    },
    {
      "lang": "es",
      "value": "Una vulnerabilidad de inyecci\u00f3n de argumento en el manejador del URI CAI: en rcplauncher en IBM Lotus Expeditor Client for Desktop versiones  6.1.1 y 6.1.2, tal como es usado Lotus Symphony y posiblemente otros productos, permite a atacantes remotos ejecutar c\u00f3digo arbitrario inyectando una opci\u00f3n -launcher por medio  de un URI cai:, como es demostrado mediante una referencia hacia un nombre de ruta (path) compartido UNC."
    }
  ],
  "id": "CVE-2008-1965",
  "lastModified": "2025-04-09T00:30:58.490",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 9.3,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2008-04-25T19:05:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0640.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29958"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://thomas.pollet.googlepages.com/lotusexpeditorurihandlervulnerability"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21303813"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/491343/100/0/threaded"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/28926"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019951"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1019952"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/1394/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41990"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://archives.neohapsis.com/archives/fulldisclosure/2008-04/0640.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29958"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://thomas.pollet.googlepages.com/lotusexpeditorurihandlervulnerability"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=swg21303813"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/491343/100/0/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Exploit"
      ],
      "url": "http://www.securityfocus.com/bid/28926"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019951"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1019952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/1394/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/41990"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-94"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…