Required CVE Record Information
Description
Argument injection vulnerability in the cai: URI handler in rcplauncher in IBM Lotus Expeditor Client for Desktop 6.1.1 and 6.1.2, as used by Lotus Symphony and possibly other products, allows remote attackers to execute arbitrary code by injecting a -launcher option via a cai: URI, as demonstrated by a reference to a UNC share pathname.
References 10 Total
- securityfocus.com: 28926 vdb-entry
- securitytracker.com: 1019952 vdb-entry
- vupen.com: ADV-2008-1394 vdb-entry
- archives.neohapsis.com: 20080424 Lotus expeditor rcplauncher uri handler vulnerability mailing-list
- securitytracker.com: 1019951 vdb-entry
- exchange.xforce.ibmcloud.com: ibm-lotussymphony-rcplauncher-code-execution(41990) vdb-entry
- secunia.com: 29958 third-party-advisory
- http://thomas.pollet.googlepages.com/lotusexpeditorurihandlervulnerability
- securityfocus.com: 20080425 Lotus expeditor rcplauncher uri handler vulnerability mailing-list
- http://www-1.ibm.com/support/docview.wss?uid=swg21303813
Updated:
This container includes required additional information provided by the CVE Program for this vulnerability.
References 10 Total
- securityfocus.com: 28926 vdb-entryx_transferred
- securitytracker.com: 1019952 vdb-entryx_transferred
- vupen.com: ADV-2008-1394 vdb-entryx_transferred
- archives.neohapsis.com: 20080424 Lotus expeditor rcplauncher uri handler vulnerability mailing-listx_transferred
- securitytracker.com: 1019951 vdb-entryx_transferred
- exchange.xforce.ibmcloud.com: ibm-lotussymphony-rcplauncher-code-execution(41990) vdb-entryx_transferred
- secunia.com: 29958 third-party-advisoryx_transferred
- http://thomas.pollet.googlepages.com/lotusexpeditorurihandlervulnerability x_transferred
- securityfocus.com: 20080425 Lotus expeditor rcplauncher uri handler vulnerability mailing-listx_transferred
- http://www-1.ibm.com/support/docview.wss?uid=swg21303813 x_transferred