Vulnerabilites related to ibm - rational_common_licensing
cve-2011-1205
Vulnerability from cvelistv5
Published
2011-03-29 18:00
Modified
2024-08-06 22:21
Severity ?
Summary
Multiple buffer overflows in unspecified COM objects in Rational Common Licensing 7.0 through 7.1.1.4 in IBM Rational ClearCase 7.0.0.4 through 7.1.1.4, ClearQuest 7.0.0.4 through 7.1.1.4, and other products allow local users to gain privileges via a Trojan horse HTML document in the My Computer zone.
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T22:21:33.761Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "rational-licensing-code-execution(66304)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66304"
          },
          {
            "name": "rational-licensing-code-execution(66324)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66324"
          },
          {
            "name": "ADV-2011-0832",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0832"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.ibm.com/support/docview.wss?uid=swg21470998"
          },
          {
            "name": "1025269",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025269"
          },
          {
            "name": "1025268",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1025268"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2011-03-28T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in unspecified COM objects in Rational Common Licensing 7.0 through 7.1.1.4 in IBM Rational ClearCase 7.0.0.4 through 7.1.1.4, ClearQuest 7.0.0.4 through 7.1.1.4, and other products allow local users to gain privileges via a Trojan horse HTML document in the My Computer zone."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "rational-licensing-code-execution(66304)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66304"
        },
        {
          "name": "rational-licensing-code-execution(66324)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66324"
        },
        {
          "name": "ADV-2011-0832",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0832"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.ibm.com/support/docview.wss?uid=swg21470998"
        },
        {
          "name": "1025269",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025269"
        },
        {
          "name": "1025268",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1025268"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2011-1205",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in unspecified COM objects in Rational Common Licensing 7.0 through 7.1.1.4 in IBM Rational ClearCase 7.0.0.4 through 7.1.1.4, ClearQuest 7.0.0.4 through 7.1.1.4, and other products allow local users to gain privileges via a Trojan horse HTML document in the My Computer zone."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "rational-licensing-code-execution(66304)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66304"
            },
            {
              "name": "rational-licensing-code-execution(66324)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66324"
            },
            {
              "name": "ADV-2011-0832",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0832"
            },
            {
              "name": "http://www.ibm.com/support/docview.wss?uid=swg21470998",
              "refsource": "CONFIRM",
              "url": "http://www.ibm.com/support/docview.wss?uid=swg21470998"
            },
            {
              "name": "1025269",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025269"
            },
            {
              "name": "1025268",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1025268"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2011-1205",
    "datePublished": "2011-03-29T18:00:00",
    "dateReserved": "2011-03-03T00:00:00",
    "dateUpdated": "2024-08-06T22:21:33.761Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2011-03-29 18:55
Modified
2024-11-21 01:25
Severity ?
Summary
Multiple buffer overflows in unspecified COM objects in Rational Common Licensing 7.0 through 7.1.1.4 in IBM Rational ClearCase 7.0.0.4 through 7.1.1.4, ClearQuest 7.0.0.4 through 7.1.1.4, and other products allow local users to gain privileges via a Trojan horse HTML document in the My Computer zone.
Impacted products
Vendor Product Version
ibm rational_clearcase 7.0.0.4
ibm rational_clearcase 7.0.0.5
ibm rational_clearcase 7.0.0.6
ibm rational_clearcase 7.0.0.7
ibm rational_clearcase 7.0.0.8
ibm rational_clearcase 7.0.0.9
ibm rational_clearcase 7.0.1
ibm rational_clearcase 7.0.1.1
ibm rational_clearcase 7.0.1.2
ibm rational_clearcase 7.0.1.3
ibm rational_clearcase 7.0.1.4
ibm rational_clearcase 7.0.1.5
ibm rational_clearcase 7.0.1.6
ibm rational_clearcase 7.0.1.7
ibm rational_clearcase 7.0.1.8
ibm rational_clearcase 7.0.1.9
ibm rational_clearcase 7.0.1.10
ibm rational_clearcase 7.0.1.11
ibm rational_clearcase 7.1
ibm rational_clearcase 7.1.0.1
ibm rational_clearcase 7.1.0.2
ibm rational_clearcase 7.1.1
ibm rational_clearcase 7.1.1.1
ibm rational_clearcase 7.1.1.2
ibm rational_clearcase 7.1.1.3
ibm rational_clearcase 7.1.1.4
ibm rational_clearquest 7.0.0.4
ibm rational_clearquest 7.0.0.5
ibm rational_clearquest 7.0.0.6
ibm rational_clearquest 7.0.0.7
ibm rational_clearquest 7.0.0.8
ibm rational_clearquest 7.0.0.9
ibm rational_clearquest 7.0.1
ibm rational_clearquest 7.0.1.0
ibm rational_clearquest 7.0.1.1
ibm rational_clearquest 7.0.1.2
ibm rational_clearquest 7.0.1.3
ibm rational_clearquest 7.0.1.4
ibm rational_clearquest 7.0.1.5
ibm rational_clearquest 7.0.1.6
ibm rational_clearquest 7.0.1.7
ibm rational_clearquest 7.0.1.8
ibm rational_clearquest 7.0.1.9
ibm rational_clearquest 7.0.1.10
ibm rational_clearquest 7.0.1.11
ibm rational_clearquest 7.1
ibm rational_clearquest 7.1.0.1
ibm rational_clearquest 7.1.0.2
ibm rational_clearquest 7.1.1.1
ibm rational_clearquest 7.1.1.2
ibm rational_clearquest 7.1.1.3
ibm rational_clearquest 7.1.1.4
ibm rational_common_licensing 7.0
ibm rational_common_licensing 7.0.0.1
ibm rational_common_licensing 7.0.0.2
ibm rational_common_licensing 7.0.1
ibm rational_common_licensing 7.0.1.1
ibm rational_common_licensing 7.0.3.1
ibm rational_common_licensing 7.1
ibm rational_common_licensing 7.1.0.1
ibm rational_common_licensing 7.1.0.2
ibm rational_common_licensing 7.1.1
ibm rational_common_licensing 7.1.1.1
ibm rational_common_licensing 7.1.1.2
ibm rational_common_licensing 7.1.1.3
ibm rational_common_licensing 7.1.1.4



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "63308FC2-AE4D-4D50-B969-6AB28A77E550",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "58B7253C-8C65-4741-ACEA-ACB48D64CA78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "25406D9C-7938-44A9-A396-D84653511721",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "89289CAB-2043-41C0-AF40-C450AB3CEDD8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "186D9C7F-3E3E-477E-A20A-91E70264AF6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "908678FF-CB67-430A-A9E0-4F408FA00AF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "ED125939-3657-45AC-8F41-F61B08B4A220",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "89778E9A-90E8-4467-A33B-5F2BB0762A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "FCCE7749-300A-452B-B428-9CF1DB000205",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "6E293794-7223-46EE-BA6A-EF0535566312",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "45659CEA-A7C3-45EE-B0FF-A612BD701485",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D149E05-BFCF-4C5A-9B9E-E1C5510E5A43",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1FBB3504-A37E-49D0-B668-00E57AC0B58D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "F6CF9723-DCC6-47CE-BAC3-07E54CAD2382",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB83063B-B145-44F1-A331-B1534551F097",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "BD2E9160-FFF9-4FEF-A498-D9E52C1F1FE8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "04699004-9016-40F6-8BA3-46ED1048EF2E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.0.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "AD6E9FBE-4D7A-4775-94AB-614653718710",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDAC2996-1ACC-423C-BEA5-D86652A748D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "D6F83672-CA00-4172-9ED5-41136A997E36",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B940818-39A1-4D85-A74E-4B409519A397",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F67F177E-8B10-4D96-A337-5E207D77CCF5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "838C21C7-9FBE-4119-968D-8091A7002FAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "EB22A0A9-80FE-4009-8003-F6FAFD677EB0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "53CA02F1-8279-4061-8130-BB944CAA0386",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearcase:7.1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "B1AD4D68-A16D-4938-B791-C89693836DBB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "677DFFEC-D128-4F26-994E-02BBDC2CFA67",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.0.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BE76312-2E8E-4559-ACBB-9089B64C6E51",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.0.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "697342E1-79DB-44AE-BAF9-C90D48F20720",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.0.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "EE3C539B-B353-4A62-AD9D-F6E2D5ED0F88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.0.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "56358994-690C-404F-9931-F6240CF869D0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.0.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "977C5C80-A289-4AFE-B910-2D17E1761711",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "2EBBBF4D-97FD-4DBC-B296-4235BAD38F61",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "741C008D-917B-44BB-AB20-6A662668B526",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "00E3D80A-849E-4739-8905-373AE0C0189D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4525242E-6B9A-4F6F-B506-93C92958CA41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "70B52763-5940-4249-BEB4-C14C008DA48E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "23E2844B-40BA-48F1-8E2E-C0534078D186",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "0F5CA588-A2F2-46AA-9C76-E9B51BF2B91B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "97B82694-8D27-485E-8B02-A93146AADA0B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6843D8A9-4884-49C0-B663-E400F8060D6C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "F3F558D1-A530-4778-A061-CA68DB2AA86B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.9:*:*:*:*:*:*:*",
              "matchCriteriaId": "9B3D0F17-A127-4514-85C4-266F371592DA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "125F8B61-FD9F-411D-9555-FCC75BB98E48",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.0.1.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "4842BC01-2573-4143-9C98-CB54FFEEBF95",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FD7F255A-380A-4165-81E9-CC1BD76DFF1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A8D6A4C-A5B0-46A8-80ED-CAD3EC279149",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "457D44F0-BD01-488C-AEB1-8D82E726AECB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AB4DB93-26A7-4B5E-ACF5-B8D95AC31566",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F74EBAA-8A68-4F20-B14D-D1A77D57BC38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "10A1A052-179D-411F-A214-EF2AF7E5F0F5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_clearquest:7.1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "230908F8-95CB-4273-BA32-0987145E5FDD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "9E493C7B-F6F5-4F00-8AFC-8DA9AE21CB08",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.0.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A36449BB-861A-47F7-94BF-58CEED569FFC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.0.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "49FB892E-4795-4488-8198-DC7F9EEFDB89",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A6F6382-5DA8-43E6-BB41-9BFD465EC443",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.0.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E86218F-3AA1-4287-B71E-0A0DFD46B8C8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.0.3.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E0EA8EF0-1288-4AC6-81BF-0FA63FBD5C70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "888C7414-FF22-4102-94CD-EE695967107A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.1.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5D6B321-7AD3-4B70-B853-80764815985D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.1.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D3685261-5566-463C-BABF-DC68A2A6529D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AACE52B-8712-4D41-94B6-16C4B7B79B7E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.1.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9ABDC099-EEB7-4ED2-B381-2A7D4674ED50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.1.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C8D8B01-BABC-4294-89DB-11A65B2F31F3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.1.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3153FA5A-6A8E-40EC-9F55-15F570613C09",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:ibm:rational_common_licensing:7.1.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3C48E34C-865D-4C82-A4C5-6F18A0A1044C",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in unspecified COM objects in Rational Common Licensing 7.0 through 7.1.1.4 in IBM Rational ClearCase 7.0.0.4 through 7.1.1.4, ClearQuest 7.0.0.4 through 7.1.1.4, and other products allow local users to gain privileges via a Trojan horse HTML document in the My Computer zone."
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desbordamientos de b\u00fafer en objetos COM no especificados de Rational Common Licensing v7.0 hasta v7.1.1.4 en IBM Rational ClearCase v7.0.0.4 hasta v7.1.1.4, ClearQuest v7.0.0.4 hasta v7.1.1.4 y otros productos, permite a usuarios locales ganar privilegios a trav\u00e9s de un documento HTML caballo de troya en la zona de Mi PC"
    }
  ],
  "id": "CVE-2011-1205",
  "lastModified": "2024-11-21T01:25:47.740",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 6.9,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:L/AC:M/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 3.4,
        "impactScore": 10.0,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": true
      }
    ]
  },
  "published": "2011-03-29T18:55:02.160",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg21470998"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025268"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securitytracker.com/id?1025269"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2011/0832"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66304"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66324"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.ibm.com/support/docview.wss?uid=swg21470998"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025268"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securitytracker.com/id?1025269"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2011/0832"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66304"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/66324"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "CWE-119"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}