HCL Domino is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vulnerability described in CVE-2022-44754. This vulnerability applies to software previously licensed by IBM.
References
Link | Resource |
---|---|
https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102151 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
01 Mar 2023, 15:48
Type | Values Removed | Values Added |
---|---|---|
Summary | HCL Domino is susceptible to a stack based buffer overflow vulnerability in lasr.dll in Micro Focus KeyView. This could allow a remote unauthenticated attacker to crash the application or execute arbitrary code via a crafted Lotus Ami Pro file. This is different from the vulnerability described in CVE-2022-44754. This vulnerability applies to software previously licensed by IBM. | |
CPE | cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_7:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_6:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_1:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_8:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_2:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_3:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_4:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:-:*:*:*:*:*:* cpe:2.3:a:ibm:domino:*:*:*:*:*:*:*:* |
cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8_interim_fix_1:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:*:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:fixpack_6:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:fixpack_3:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0:*:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_10_interim_fix_3:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8_interim_fix_3:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:fixpack_5:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:fixpack_7:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:fixpack_9:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:-:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_10_interim_fix_4:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:fixpack_8:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:fixpack_10:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:fixpack_4:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_8_interim_fix_2:*:*:*:*:*:* cpe:2.3:a:hcltech:domino:9.0.1:feature_pack_10_interim_fix_5:*:*:*:*:*:* |
References | (MISC) https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102151 - Vendor Advisory |
22 Dec 2022, 20:03
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.8 |
CPE | cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_1:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_7:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_4:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_5:*:*:*:*:*:* cpe:2.3:a:ibm:domino:*:*:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_3:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:-:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_6:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_8:*:*:*:*:*:* cpe:2.3:a:ibm:domino:9.0.1.10:interim_fix_2:*:*:*:*:*:* |
|
References | (MISC) https://support.hcltechsw.com/csm?id=kb_article&sysparm_article=KB0102151 - Third Party Advisory | |
CWE | CWE-787 |
19 Dec 2022, 13:12
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2022-12-19 11:15
Updated : 2024-02-04 23:14
NVD link : CVE-2022-44750
Mitre link : CVE-2022-44750
CVE.ORG link : CVE-2022-44750
JSON object : View
Products Affected
hcltech
- domino
CWE
CWE-787
Out-of-bounds Write