First published: Wed Nov 08 2006(Updated: )
Multiple buffer overflows in tunekrnl in IBM Lotus Domino 6.x before 6.5.5 FP2 and 7.x before 7.0.2 allow local users to gain privileges and execute arbitrary code via unspecified vectors.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Lotus Domino | =6.5.4 | |
IBM Lotus Domino | =6.0.5 | |
IBM Lotus Domino | =6.5.2 | |
IBM Lotus Domino | =6.0 | |
IBM Lotus Domino | =6.0.4 | |
IBM Lotus Domino | =6.0.2 | |
IBM Lotus Domino | =6.5.4 | |
IBM Lotus Domino | <=6.5.5 | |
IBM Lotus Domino | =6.0.2_cf2 | |
IBM Lotus Domino | <=7.0.1 | |
IBM Lotus Domino | =6.5 | |
IBM Lotus Domino | =6.5.1 | |
IBM Lotus Domino | =7.0 | |
IBM Lotus Domino | =6.5.4 | |
IBM Lotus Domino | =6.0.1 | |
IBM Lotus Domino | =6.5.3 | |
IBM Lotus Domino | =6.0.3 | |
IBM Lotus Domino | =6.5.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2006-5818 is classified as a high severity vulnerability due to the potential for privilege escalation and arbitrary code execution.
To rectify CVE-2006-5818, it is recommended to update IBM Lotus Domino to the latest version or apply the necessary security patches.
CVE-2006-5818 affects local users of IBM Lotus Domino versions 6.x before 6.5.5 FP2 and 7.x before 7.0.2.
CVE-2006-5818 involves multiple buffer overflow vulnerabilities allowing local users to exploit the system.
CVE-2006-5818 requires local access for exploitation, meaning it cannot be exploited remotely without prior access.