Executive Summary

Name CVE-2011-0915 First vendor Publication 2011-02-08
Vendor Cve Last vendor Modification 2018-10-09

Security-Database Scoring CVSS v3

Cvss vector : N/A
Overall CVSS Score NA
Base Score NA Environmental Score NA
impact SubScore NA Temporal Score NA
Exploitabality Sub Score NA
Calculate full CVSS 3.0 Vectors scores

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C)
Cvss Base Score 10 Attack Range Network
Cvss Impact Score 10 Attack Complexity Low
Cvss Expoit Score 10 Authentication None Required
Calculate full CVSS 2.0 Vectors scores


Stack-based buffer overflow in nrouter.exe in IBM Lotus Domino before 8.5.3 allows remote attackers to execute arbitrary code via a long name parameter in a Content-Type header in a malformed Notes calendar (aka iCalendar or iCal) meeting request, aka SPR KLYH87LL23.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2011-0915

CWE : Common Weakness Enumeration

% Id Name
100 % CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

Application 94

OpenVAS Exploits

Date Description
2011-05-09 Name : IBM Lotus Domino Multiple Remote Buffer Overflow Vulnerabilities
File : nvt/secpod_ibm_lotus_domino_mult_bof_vuln.nasl

Open Source Vulnerability Database (OSVDB)

Id Description
72160 IBM Lotus Domino nrouter.exe Content-Type Header name Parameter Overflow

Domino is prone to an overflow condition. nrouter.exe fails to properly sanitize user-supplied input resulting in a buffer overflow. With a specially crafted calendar meeting request, a remote attacker can potentially cause arbitrary code execution.

Nessus® Vulnerability Scanner

Date Description
2013-04-26 Name : The remote web server is affected by multiple vulnerabilities.
File : domino_8_5_3.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

Source Url
BUGTRAQ http://www.securityfocus.com/archive/1/516245/100/0/threaded
CONFIRM http://www-01.ibm.com/support/docview.wss?uid=swg21461514
MISC http://zerodayinitiative.com/advisories/ZDI-11-048/
SECUNIA http://secunia.com/advisories/43208

Alert History

If you want to see full details history, please login or register.
Date Informations
2021-05-05 01:08:12
  • Multiple Updates
2021-05-04 12:14:06
  • Multiple Updates
2021-04-22 01:15:18
  • Multiple Updates
2020-05-23 01:43:58
  • Multiple Updates
2020-05-23 00:27:53
  • Multiple Updates
2018-10-10 00:19:41
  • Multiple Updates
2017-11-23 12:03:51
  • Multiple Updates
2016-04-26 20:35:13
  • Multiple Updates
2014-02-17 11:00:46
  • Multiple Updates
2013-05-10 22:55:41
  • Multiple Updates