First published: Thu Dec 17 2020(Updated: )
A vulnerability in the input parameter handling of HCL Notes v9 could potentially be exploited by an authenticated attacker resulting in a stack buffer overflow. This could allow the attacker to crash the program or inject code into the system which would execute with the privileges of the currently logged in user.
Credit: psirt@hcl.com
Affected Software | Affected Version | How to fix |
---|---|---|
HCL Notes | =9.0 | |
HCL Notes | =9.0.1 | |
HCL Notes | =9.0.1-fp10 | |
HCL Notes | =9.0.1-fp10if1 | |
HCL Notes | =9.0.1-fp10if2 | |
HCL Notes | =9.0.1-fp10if3 | |
HCL Notes | =9.0.1-fp10if4 | |
HCL Notes | =9.0.1-fp10if5 | |
HCL Notes | =9.0.1-fp10if6 | |
HCL Notes | =9.0.1-fp10if7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-14232 has a medium severity rating as it can be exploited by an authenticated attacker to cause a stack buffer overflow.
To fix CVE-2020-14232, upgrade HCL Notes to the latest version that addresses this vulnerability.
The potential impacts of CVE-2020-14232 include program crashes and the possibility of code execution with the privileges of the currently authenticated user.
CVE-2020-14232 affects HCL Notes versions 9.0 and 9.0.1, including various fix packs.
CVE-2020-14232 is not exploitable remotely as it requires authenticated access to the HCL Notes application.