cpe:/a:ibm:tivoli_directory_server:5.2.0 cpe:/a:ibm:tivoli_directory_server:5.2.0.4 cpe:/a:ibm:tivoli_directory_server:6.0 cpe:/a:ibm:tivoli_directory_server:6.0.0.0 cpe:/a:ibm:tivoli_directory_server:6.0.0.1 cpe:/a:ibm:tivoli_directory_server:6.0.0.7 cpe:/a:ibm:tivoli_directory_server:6.0.0.8 cpe:/a:ibm:tivoli_directory_server:6.0.0.14 cpe:/a:ibm:tivoli_directory_server:6.0.0.19 cpe:/a:ibm:tivoli_directory_server:6.0.0.33 cpe:/a:ibm:tivoli_directory_server:6.0.0.41 cpe:/a:ibm:tivoli_directory_server:6.0.0.45 cpe:/a:ibm:tivoli_directory_server:6.0.0.52 cpe:/a:ibm:tivoli_directory_server:6.0.0.53 cpe:/a:ibm:tivoli_directory_server:6.0.0.54 cpe:/a:ibm:tivoli_directory_server:6.0.0.55 cpe:/a:ibm:tivoli_directory_server:6.0.0.56 cpe:/a:ibm:tivoli_directory_server:6.0.0.57 cpe:/a:ibm:tivoli_directory_server:6.0.0.58 cpe:/a:ibm:tivoli_directory_server:6.0.0.59 cpe:/a:ibm:tivoli_directory_server:6.0.0.60 cpe:/a:ibm:tivoli_directory_server:6.0.0.61 cpe:/a:ibm:tivoli_directory_server:6.0.0.62 cpe:/a:ibm:tivoli_directory_server:6.0.0.63 cpe:/a:ibm:tivoli_directory_server:6.0.0.64 cpe:/a:ibm:tivoli_directory_server:6.0.0.65 cpe:/a:ibm:tivoli_directory_server:6.0.0.66 cpe:/a:ibm:tivoli_directory_server:6.1.0.0 cpe:/a:ibm:tivoli_directory_server:6.1.0.1 cpe:/a:ibm:tivoli_directory_server:6.1.0.2 cpe:/a:ibm:tivoli_directory_server:6.1.0.3 cpe:/a:ibm:tivoli_directory_server:6.1.0.4 cpe:/a:ibm:tivoli_directory_server:6.1.0.5 cpe:/a:ibm:tivoli_directory_server:6.1.0.6 cpe:/a:ibm:tivoli_directory_server:6.1.0.7 cpe:/a:ibm:tivoli_directory_server:6.1.0.8 cpe:/a:ibm:tivoli_directory_server:6.1.0.9 cpe:/a:ibm:tivoli_directory_server:6.1.0.10 cpe:/a:ibm:tivoli_directory_server:6.1.0.11 cpe:/a:ibm:tivoli_directory_server:6.1.0.12 cpe:/a:ibm:tivoli_directory_server:6.1.0.13 cpe:/a:ibm:tivoli_directory_server:6.1.0.14 cpe:/a:ibm:tivoli_directory_server:6.1.0.15 cpe:/a:ibm:tivoli_directory_server:6.1.0.17 cpe:/a:ibm:tivoli_directory_server:6.1.0.18 cpe:/a:ibm:tivoli_directory_server:6.1.0.19 cpe:/a:ibm:tivoli_directory_server:6.1.0.20 cpe:/a:ibm:tivoli_directory_server:6.1.0.21 cpe:/a:ibm:tivoli_directory_server:6.1.0.22 cpe:/a:ibm:tivoli_directory_server:6.1.0.23 cpe:/a:ibm:tivoli_directory_server:6.1.0.24 cpe:/a:ibm:tivoli_directory_server:6.1.0.25 cpe:/a:ibm:tivoli_directory_server:6.1.0.26 cpe:/a:ibm:tivoli_directory_server:6.1.0.27 cpe:/a:ibm:tivoli_directory_server:6.1.0.28 cpe:/a:ibm:tivoli_directory_server:6.1.0.29 cpe:/a:ibm:tivoli_directory_server:6.1.0.30 cpe:/a:ibm:tivoli_directory_server:6.1.0.31 cpe:/a:ibm:tivoli_directory_server:6.1.0.32 cpe:/a:ibm:tivoli_directory_server:6.1.0.33 cpe:/a:ibm:tivoli_directory_server:6.1.0.34 cpe:/a:ibm:tivoli_directory_server:6.1.0.35 cpe:/a:ibm:tivoli_directory_server:6.1.0.36 cpe:/a:ibm:tivoli_directory_server:6.1.0.37 cpe:/a:ibm:tivoli_directory_server:6.1.0.38 cpe:/a:ibm:tivoli_directory_server:6.1.0.39 cpe:/a:ibm:tivoli_directory_server:6.2.0.0 cpe:/a:ibm:tivoli_directory_server:6.2.0.1 cpe:/a:ibm:tivoli_directory_server:6.2.0.2 cpe:/a:ibm:tivoli_directory_server:6.2.0.3 cpe:/a:ibm:tivoli_directory_server:6.2.0.4 cpe:/a:ibm:tivoli_directory_server:6.2.0.5 cpe:/a:ibm:tivoli_directory_server:6.2.0.6 cpe:/a:ibm:tivoli_directory_server:6.2.0.7 cpe:/a:ibm:tivoli_directory_server:6.2.0.8 cpe:/a:ibm:tivoli_directory_server:6.2.0.10 cpe:/a:ibm:tivoli_directory_server:6.2.0.11 cpe:/a:ibm:tivoli_directory_server:6.2.0.12 cpe:/a:ibm:tivoli_directory_server:6.2.0.13 cpe:/a:ibm:tivoli_directory_server:6.2.0.14 cpe:/a:ibm:tivoli_directory_server:6.2.0.15 cpe:/a:ibm:tivoli_directory_server:6.3.0.0 cpe:/a:ibm:tivoli_directory_server:6.3.0.1 cpe:/a:ibm:tivoli_directory_server:6.3.0.2 CVE-2011-1206 2011-04-21T06:55:02.623-04:00 2017-08-16T21:34:00.277-04:00 10.0 NETWORK LOW NONE COMPLETE COMPLETE COMPLETE http://nvd.nist.gov 2011-04-21T12:14:00.000-04:00 SECTRACK 1025358 SECUNIA 44184 SREASON 8213 AIXAPAR IO14009 AIXAPAR IO14010 AIXAPAR IO14013 AIXAPAR IO14045 AIXAPAR IO14046 CONFIRM http://www.ibm.com/support/docview.wss?uid=swg21496117 CONFIRM http://www.ibm.com/support/docview.wss?uid=swg24029659 CONFIRM http://www.ibm.com/support/docview.wss?uid=swg24029660 CONFIRM http://www.ibm.com/support/docview.wss?uid=swg24029661 CONFIRM http://www.ibm.com/support/docview.wss?uid=swg24029663 CONFIRM http://www.ibm.com/support/docview.wss?uid=swg24029672 XF ibm-tds-ibmslapd-bo(66711) Stack-based buffer overflow in the server process in ibmslapd.exe in IBM Tivoli Directory Server (TDS) 5.2 before 5.2.0.5-TIV-ITDS-IF0010, 6.0 before 6.0.0.67 (aka 6.0.0.8-TIV-ITDS-IF0009), 6.1 before 6.1.0.40 (aka 6.1.0.5-TIV-ITDS-IF0003), 6.2 before 6.2.0.16 (aka 6.2.0.3-TIV-ITDS-IF0002), and 6.3 before 6.3.0.3 (aka 6.3.0.0-TIV-ITDS-IF0003) allows remote attackers to execute arbitrary code via a crafted LDAP request. NOTE: some of these details are obtained from third party information.