CVE-2012-0201

Stack-based buffer overflow in pcspref.dll in pcsws.exe in IBM Personal Communications 5.9.x before 5.9.8 and 6.0.x before 6.0.4 might allow remote attackers to execute arbitrary code via a long profile string in a WorkStation (aka .ws) file.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:ibm:personal_communications:5.9.7.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:personal_communications:5.9.7.1:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:a:ibm:personal_communications:6.0.3.0:*:*:*:*:*:*:*

History

21 Nov 2024, 01:34

Type Values Removed Values Added
References () http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/ibm_pcm_ws.rb - () http://dev.metasploit.com/redmine/projects/framework/repository/entry/modules/exploits/windows/fileformat/ibm_pcm_ws.rb -
References () http://www-01.ibm.com/support/docview.wss?uid=swg1IC81539 - () http://www-01.ibm.com/support/docview.wss?uid=swg1IC81539 -
References () http://www-01.ibm.com/support/docview.wss?uid=swg21586166 - Vendor Advisory () http://www-01.ibm.com/support/docview.wss?uid=swg21586166 - Vendor Advisory
References () http://www.exploit-db.com/exploits/18539/ - Exploit () http://www.exploit-db.com/exploits/18539/ - Exploit
References () http://www.metasploit.com/modules/exploit/windows/fileformat/ibm_pcm_ws - () http://www.metasploit.com/modules/exploit/windows/fileformat/ibm_pcm_ws -
References () http://www.stratsec.net/Research/Advisories/IBM-Personal-Communications-I-Series-Access-WorkSt - Exploit () http://www.stratsec.net/Research/Advisories/IBM-Personal-Communications-I-Series-Access-WorkSt - Exploit
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/73127 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/73127 -

Information

Published : 2012-03-02 11:55

Updated : 2025-04-11 00:51


NVD link : CVE-2012-0201

Mitre link : CVE-2012-0201

CVE.ORG link : CVE-2012-0201


JSON object : View

Products Affected

ibm

  • personal_communications
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer