First published: Mon Jan 09 2006(Updated: )
Multiple memory leaks in IBM Lotus Notes and Domino Server before 6.5.5 allow attackers to cause a denial of service (memory consumption and crash) via unknown vectors related to (1) unspecified vectors during the SSL handshake (SPR# MKIN67MQVW), (2) the stash file during the SSL handshake (SPR# MKIN693QUT), and possibly other vectors. NOTE: due to insufficient information in the original vendor advisory, it is not clear whether there is an attacker role in other memory leaks that are specified in the advisory.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Lotus Domino | =6.5.4 | |
IBM Lotus Notes | =6.5.2 | |
Ibm Lotus Domino Enterprise Server | =6.5.4 | |
IBM Lotus Domino | =6.5.2 | |
IBM Lotus Domino | =6.5.4 | |
IBM Lotus Domino | =6.5.1 | |
IBM Lotus Notes | =6.5.4 | |
IBM Lotus Domino | =6.5.0 | |
IBM Lotus Notes | =6.5.1 | |
IBM Lotus Domino | =6.5.4 | |
IBM Lotus Notes | =6.5 | |
IBM Lotus Domino | =6.5.3 | |
IBM Lotus Notes | =6.5.3 | |
Ibm Lotus Domino Enterprise Server | =6.5.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-0121 is considered a moderate severity vulnerability due to potential denial of service attacks.
To fix CVE-2006-0121, upgrade to IBM Lotus Notes or Domino Server version 6.5.5 or later.
CVE-2006-0121 affects versions 6.5.0 through 6.5.4 of IBM Lotus Notes and Domino Server.
CVE-2006-0121 allows attackers to exploit memory leaks, leading to a denial of service through crashes due to excessive memory consumption.
There is no documented workaround for CVE-2006-0121; upgrading to a fixed version is the recommended solution.