CVE-2006-0119

Multiple unspecified vulnerabilities in IBM Lotus Notes and Domino Server before 6.5.5 have unknown impact and attack vectors, due to "potential security issues" as identified by SPR numbers (1) GPKS6C9J67 in Agents, (2) JGAN6B6TZ3 and (3) KSPR699NBP in the Router, (4) GPKS5YQGPT in Security, or (5) HSAO6BNL6Y in the Web Server. NOTE: vector 3 is related to an issue in NROUTER in IBM Lotus Notes and Domino Server before 6.5.4 FP1, 6.5.5, and 7.0, which allows remote attackers to cause a denial of service (CPU consumption) via a crafted vCal meeting request sent via SMTP (aka SPR# KSPR699NBP).
References
Link Resource
http://secunia.com/advisories/18328 Patch Vendor Advisory
http://secunia.com/advisories/20855 Vendor Advisory
http://securitytracker.com/id?1016390
http://www-1.ibm.com/support/docview.wss?uid=swg27007054
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/94a77eb898843aca8525709200001de1?OpenDocument&Highlight=0%2CJGAN6B6TZ3
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/9a1650d1a771f3078525702a00420def?OpenDocument&Highlight=0%2CHSAO6BNL6Y
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/d1150fc9c5dec8b18525709200001da6?OpenDocument&Highlight=0%2CGPKS6C9J67
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/de2ab57a5b9547848525701b00420c2c?OpenDocument&Highlight=0%2CKSPR699NBP
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/e4deb1cbb011c747852570e4001ba9bb?OpenDocument&Highlight=0%2CGPKS5YQGPT
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/f97fe7cfd9a8113b8525709200001db4?OpenDocument&Highlight=0%2CGPKS6C9J67
http://www.securityfocus.com/archive/1/438461/100/0/threaded
http://www.securityfocus.com/bid/16158 Patch
http://www.securityfocus.com/bid/18020
http://www.vupen.com/english/advisories/2006/0081 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2564 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24207
https://exchange.xforce.ibmcloud.com/vulnerabilities/24211
https://exchange.xforce.ibmcloud.com/vulnerabilities/27413
http://secunia.com/advisories/18328 Patch Vendor Advisory
http://secunia.com/advisories/20855 Vendor Advisory
http://securitytracker.com/id?1016390
http://www-1.ibm.com/support/docview.wss?uid=swg27007054
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/94a77eb898843aca8525709200001de1?OpenDocument&Highlight=0%2CJGAN6B6TZ3
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/9a1650d1a771f3078525702a00420def?OpenDocument&Highlight=0%2CHSAO6BNL6Y
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/d1150fc9c5dec8b18525709200001da6?OpenDocument&Highlight=0%2CGPKS6C9J67
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/de2ab57a5b9547848525701b00420c2c?OpenDocument&Highlight=0%2CKSPR699NBP
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/e4deb1cbb011c747852570e4001ba9bb?OpenDocument&Highlight=0%2CGPKS5YQGPT
http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/f97fe7cfd9a8113b8525709200001db4?OpenDocument&Highlight=0%2CGPKS6C9J67
http://www.securityfocus.com/archive/1/438461/100/0/threaded
http://www.securityfocus.com/bid/16158 Patch
http://www.securityfocus.com/bid/18020
http://www.vupen.com/english/advisories/2006/0081 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2564 Vendor Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/24207
https://exchange.xforce.ibmcloud.com/vulnerabilities/24211
https://exchange.xforce.ibmcloud.com/vulnerabilities/27413
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:lotus_domino:6.5.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_domino:6.5.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_domino:6.5.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_domino:6.5.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_domino:6.5.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_domino:6.5.4:*:fp1:*:*:*:*:*
cpe:2.3:a:ibm:lotus_domino:6.5.4:*:fp2:*:*:*:*:*
cpe:2.3:a:ibm:lotus_domino_enterprise_server:6.5.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_domino_enterprise_server:6.5.4:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*

History

21 Nov 2024, 00:05

Type Values Removed Values Added
References () http://secunia.com/advisories/18328 - Patch, Vendor Advisory () http://secunia.com/advisories/18328 - Patch, Vendor Advisory
References () http://secunia.com/advisories/20855 - Vendor Advisory () http://secunia.com/advisories/20855 - Vendor Advisory
References () http://securitytracker.com/id?1016390 - () http://securitytracker.com/id?1016390 -
References () http://www-1.ibm.com/support/docview.wss?uid=swg27007054 - () http://www-1.ibm.com/support/docview.wss?uid=swg27007054 -
References () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/94a77eb898843aca8525709200001de1?OpenDocument&Highlight=0%2CJGAN6B6TZ3 - () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/94a77eb898843aca8525709200001de1?OpenDocument&Highlight=0%2CJGAN6B6TZ3 -
References () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/9a1650d1a771f3078525702a00420def?OpenDocument&Highlight=0%2CHSAO6BNL6Y - () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/9a1650d1a771f3078525702a00420def?OpenDocument&Highlight=0%2CHSAO6BNL6Y -
References () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/d1150fc9c5dec8b18525709200001da6?OpenDocument&Highlight=0%2CGPKS6C9J67 - () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/d1150fc9c5dec8b18525709200001da6?OpenDocument&Highlight=0%2CGPKS6C9J67 -
References () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/de2ab57a5b9547848525701b00420c2c?OpenDocument&Highlight=0%2CKSPR699NBP - () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/de2ab57a5b9547848525701b00420c2c?OpenDocument&Highlight=0%2CKSPR699NBP -
References () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/e4deb1cbb011c747852570e4001ba9bb?OpenDocument&Highlight=0%2CGPKS5YQGPT - () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/e4deb1cbb011c747852570e4001ba9bb?OpenDocument&Highlight=0%2CGPKS5YQGPT -
References () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/f97fe7cfd9a8113b8525709200001db4?OpenDocument&Highlight=0%2CGPKS6C9J67 - () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/f97fe7cfd9a8113b8525709200001db4?OpenDocument&Highlight=0%2CGPKS6C9J67 -
References () http://www.securityfocus.com/archive/1/438461/100/0/threaded - () http://www.securityfocus.com/archive/1/438461/100/0/threaded -
References () http://www.securityfocus.com/bid/16158 - Patch () http://www.securityfocus.com/bid/16158 - Patch
References () http://www.securityfocus.com/bid/18020 - () http://www.securityfocus.com/bid/18020 -
References () http://www.vupen.com/english/advisories/2006/0081 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0081 - Vendor Advisory
References () http://www.vupen.com/english/advisories/2006/2564 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/2564 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24207 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24207 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24211 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24211 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/27413 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/27413 -

07 Nov 2023, 01:58

Type Values Removed Values Added
References
  • {'url': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/94a77eb898843aca8525709200001de1?OpenDocument&Highlight=0,JGAN6B6TZ3', 'name': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/94a77eb898843aca8525709200001de1?OpenDocument&Highlight=0,JGAN6B6TZ3', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/e4deb1cbb011c747852570e4001ba9bb?OpenDocument&Highlight=0,GPKS5YQGPT', 'name': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/e4deb1cbb011c747852570e4001ba9bb?OpenDocument&Highlight=0,GPKS5YQGPT', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/f97fe7cfd9a8113b8525709200001db4?OpenDocument&Highlight=0,GPKS6C9J67', 'name': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/f97fe7cfd9a8113b8525709200001db4?OpenDocument&Highlight=0,GPKS6C9J67', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/9a1650d1a771f3078525702a00420def?OpenDocument&Highlight=0,HSAO6BNL6Y', 'name': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/9a1650d1a771f3078525702a00420def?OpenDocument&Highlight=0,HSAO6BNL6Y', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/d1150fc9c5dec8b18525709200001da6?OpenDocument&Highlight=0,GPKS6C9J67', 'name': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/d1150fc9c5dec8b18525709200001da6?OpenDocument&Highlight=0,GPKS6C9J67', 'tags': [], 'refsource': 'CONFIRM'}
  • {'url': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/de2ab57a5b9547848525701b00420c2c?OpenDocument&Highlight=0,KSPR699NBP', 'name': 'http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/de2ab57a5b9547848525701b00420c2c?OpenDocument&Highlight=0,KSPR699NBP', 'tags': [], 'refsource': 'CONFIRM'}
  • () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/9a1650d1a771f3078525702a00420def?OpenDocument&Highlight=0%2CHSAO6BNL6Y -
  • () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/94a77eb898843aca8525709200001de1?OpenDocument&Highlight=0%2CJGAN6B6TZ3 -
  • () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/d1150fc9c5dec8b18525709200001da6?OpenDocument&Highlight=0%2CGPKS6C9J67 -
  • () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/de2ab57a5b9547848525701b00420c2c?OpenDocument&Highlight=0%2CKSPR699NBP -
  • () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/e4deb1cbb011c747852570e4001ba9bb?OpenDocument&Highlight=0%2CGPKS5YQGPT -
  • () http://www-10.lotus.com/ldd/r5fixlist.nsf/5c087391999d06e7852569280062619d/f97fe7cfd9a8113b8525709200001db4?OpenDocument&Highlight=0%2CGPKS6C9J67 -

Information

Published : 2006-01-09 11:03

Updated : 2024-11-21 00:05


NVD link : CVE-2006-0119

Mitre link : CVE-2006-0119

CVE.ORG link : CVE-2006-0119


JSON object : View

Products Affected

ibm

  • lotus_domino
  • lotus_domino_enterprise_server
  • lotus_notes