CVE-2011-1741
EMC Documentum eRoom Indexing Server OpenText HummingBird Connector Remote Code Execution Vulnerability
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Stack-based buffer overflow in ftserver.exe in the OpenText Hummingbird Client Connector, as used in the Indexing Server in EMC Documentum eRoom 7.x before 7.4.3.f and other products, allows remote attackers to execute arbitrary code by sending a crafted message over TCP.
Desbordamiento de búfer basado en pila en ftserver.exe en OpenText Hummingbird Client Connector, como el usado en Indexing Server en EMC Documentum eRoom v7.x before v7.4.3.f y otros productos, permite a atacantes remotos ejecutar código de su elección mandando un mensaje manipulado sobre TCP.
This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of EMC Documentum eRoom Indexing Server. Authentication is not required to exploit this vulnerability.
The specific flaw exists within the bundled implementation of OpenText's HummingBird Connector. When parsing a particular packet received from a TCP connection, the application will attempt to copy part of the packet's contents into a buffer located on the stack. Due to not completely accommodating for the size of the data in the packet, the application will overwrite variables positioned after the buffer. This can lead to code execution under the context of the server.
CVSS Scores
SSVC
- Decision:-
Timeline
- 2011-04-19 CVE Reserved
- 2011-07-18 CVE Published
- 2024-04-27 EPSS Updated
- 2024-08-06 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
References (6)
URL | Tag | Source |
---|---|---|
http://securityreason.com/securityalert/8311 | Third Party Advisory | |
http://securitytracker.com/id?1025790 | Vdb Entry | |
http://www.securityfocus.com/archive/1/518897/100/0/threaded | Mailing List | |
http://www.securityfocus.com/archive/1/518913/100/0/threaded | Mailing List | |
http://www.securityfocus.com/bid/48712 | Vdb Entry | |
http://www.zerodayinitiative.com/advisories/ZDI-11-236 | X_refsource_misc |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Emc Search vendor "Emc" | Documentum Eroom Search vendor "Emc" for product "Documentum Eroom" | 7.4.1 Search vendor "Emc" for product "Documentum Eroom" and version "7.4.1" | - |
Affected
| ||||||
Emc Search vendor "Emc" | Documentum Eroom Search vendor "Emc" for product "Documentum Eroom" | 7.4.2 Search vendor "Emc" for product "Documentum Eroom" and version "7.4.2" | - |
Affected
| ||||||
Emc Search vendor "Emc" | Documentum Eroom Search vendor "Emc" for product "Documentum Eroom" | 7.4.3 Search vendor "Emc" for product "Documentum Eroom" and version "7.4.3" | - |
Affected
|