Beschreibung
An unspecified vulnerability was found in IBM products. By exploiting this vulnerability malicious users can execute arbitrary code. This vulnerability can be exploited remotely at a point related to gcc keys. Below is a complete list of vulnerabilities
- A buffer overflow can be exploited by remote via specially designed .xls, .zip, .prz, .rtf or Applix attachments;
- An integer underflow can be exploited remotely via a specially designed .lzh attachement
Ursprüngliche Informationshinweise
CVE Liste
- CVE-2011-1213 critical
- CVE-2011-1217 critical
- CVE-2011-1218 critical
- CVE-2011-1214 critical
- CVE-2011-1216 critical
- CVE-2011-1512 critical
Mehr erfahren
Informieren Sie sich über die Statistiken der in Ihrer Region verbreiteten Sicherheitslücken statistics.securelist.com
Sie haben einen Fehler in der Beschreibung der Schwachstelle gefunden? Mitteilen!