Show plain JSON{"id": "CVE-2011-1741", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 10.0, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C", "authentication": "NONE", "integrityImpact": "COMPLETE", "accessComplexity": "LOW", "availabilityImpact": "COMPLETE", "confidentialityImpact": "COMPLETE"}, "acInsufInfo": false, "impactScore": 10.0, "baseSeverity": "HIGH", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-07-19T20:55:01.057", "references": [{"url": "http://securityreason.com/securityalert/8311", "source": "security_alert@emc.com"}, {"url": "http://securitytracker.com/id?1025790", "source": "security_alert@emc.com"}, {"url": "http://www.securityfocus.com/archive/1/518897/100/0/threaded", "source": "security_alert@emc.com"}, {"url": "http://www.securityfocus.com/archive/1/518913/100/0/threaded", "source": "security_alert@emc.com"}, {"url": "http://www.securityfocus.com/bid/48712", "source": "security_alert@emc.com"}, {"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-236", "source": "security_alert@emc.com"}, {"url": "http://securityreason.com/securityalert/8311", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://securitytracker.com/id?1025790", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/518897/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/archive/1/518913/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securityfocus.com/bid/48712", "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.zerodayinitiative.com/advisories/ZDI-11-236", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-119"}]}], "descriptions": [{"lang": "en", "value": "Stack-based buffer overflow in ftserver.exe in the OpenText Hummingbird Client Connector, as used in the Indexing Server in EMC Documentum eRoom 7.x before 7.4.3.f and other products, allows remote attackers to execute arbitrary code by sending a crafted message over TCP."}, {"lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en ftserver.exe en OpenText Hummingbird Client Connector, como el usado en Indexing Server en EMC Documentum eRoom v7.x before v7.4.3.f y otros productos, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mandando un mensaje manipulado sobre TCP."}], "lastModified": "2025-04-11T00:51:21.963", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:emc:documentum_eroom:7.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BAC26B9F-C61A-48C2-89CD-33A0569536BA"}, {"criteria": "cpe:2.3:a:emc:documentum_eroom:7.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "34579A31-D4C9-4658-ACC4-78588C69F564"}, {"criteria": "cpe:2.3:a:emc:documentum_eroom:7.4.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A21269F-F54F-426A-A860-2683FE7ADE0E"}], "operator": "OR"}]}], "sourceIdentifier": "security_alert@emc.com"}