Description
An unspecified vulnerability was found in IBM products. By exploiting this vulnerability malicious users can execute arbitrary code. This vulnerability can be exploited remotely at a point related to gcc keys. Below is a complete list of vulnerabilities
- A buffer overflow can be exploited by remote via specially designed .xls, .zip, .prz, .rtf or Applix attachments;
- An integer underflow can be exploited remotely via a specially designed .lzh attachement
Original advisories
Related products
CVE list
- CVE-2011-1213 critical
- CVE-2011-1217 critical
- CVE-2011-1218 critical
- CVE-2011-1214 critical
- CVE-2011-1216 critical
- CVE-2011-1512 critical
Read more
Find out the statistics of the vulnerabilities spreading in your region on statistics.securelist.com
Found an inaccuracy in the description of this vulnerability? Let us know!