(Feb 2011) Potential security vulnerabilities in Lotus Notes & Domino |
| |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Content | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
Most of these attacks represent denial of service attacks by buffer overflow. To exploit these vulnerabilities, an attacker would need to send maliciously malformed messages to the Lotus Domino server over a variety of protocols as indicated below. However, in specific situations, there exists the possibility to execute arbitrary code. In the case of ZDI-CAN-647 (SPR# PRAD82YJW2), malicious users could supply damaged cai::URIs to facilitate execution of arbitrary code in Notes. Refer to the table for more information on each, including the SPR number for tracking purposes and, where applicable, fix availability. For four of these nine, namely ZDI-CAN-373, ZDI-CAN-647, ZDI-CAN-758, ZDI-CAN-759, IBM Lotus has fixes. For two of these, ZDI-CAN-375 and ZDI-CAN-927, IBM has confirmed the issue and continues to pursue appropriate fixes. IBM Lotus is currently unable to reproduce the remaining three exploits based on the information provided by TippingPoint's ZDI.
IBM targets 2Q2011 for release of Lotus Notes and Domino 8.5.3. You can track progress at the Notes/Domino Update Status page. At time of publication, there currently are no known active exploits of these issues. However, if you encounter any of the unconfirmed issues, contact IBM Support with reproducible steps, referencing the related SPR number. For additional information on these issues, you can access the TippingPoint's ZDI advisories at the following link: http://www.zerodayinitiative.com/advisories Workarounds: For ZDI-CAN-927 (SPR# PRAD89WGRS), Domino does not support use of UNC paths for usage with Remote Console. As a workaround, you should specify absolute paths. For all others, there are currently no known workarounds to avoid these issues.
The following CVSS scores are based on testing results observed by IBM*. SPR KLYH87LL23 - Lotus Notes ICAL Stack Overflow
SPR PRAD82YJW2 - Lotus Notes cai URI Handler Remote Code Execution
SPR KLYH87LML7 - Lotus Domino DIIOP Remote Code Execution
SPR KLYH889MH8 - Lotus Domino MIME Stack Overflow
*The CVSS Environment Score is customer environment-specific and will ultimately impact the Overall CVSS score. Customers can evaluate the impact of this vulnerability in their environments by accessing the referenced links. - wong chee tat :) | |||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||