[VulnWatch] Lotus Domino Web Server iNotes Overflow (#NISR17022003b)

From: NGSSoftware Insight Security Research (nisr@nextgenss.com)
Date: 02/18/03

  • Next message: NGSSoftware Insight Security Research: "[VulnWatch] Lotus iNotes Client ActiveX Control Buffer Overrun (#NISR17022003c)"
    From: "NGSSoftware Insight Security Research" <nisr@nextgenss.com>
    To: <bugtraq@securityfocus.com>, <vulnwatch@vulnwatch.org>, <ntbugtraq@listserv.ntbugtraq.com>
    Date: Mon, 17 Feb 2003 16:36:28 -0800
    
    

    NGSSoftware Insight Security Research Advisory

    Name: Lotus Domino Web Server iNotes Overflow
    Systems Affected: Release 6.0
    Severity: Critical Risk
    Category: Remote System Buffer Overrun
    Vendor URL: http://www.lotus.com
    Author: Mark Litchfield (mark@ngssoftware.com)
    Date: 17th February 2003
    Advisory number: #NISR17022003b

    Description
    ***********
    Lotus Domino and Notes together provide a featured enterprise collaboration
    system with Domino providing application server services. iNotes provides
    web based messaging facilities.

    Details
    *******
    iNotes suffers from a remotley exploitable buffer overrun when an attacker
    provides an overly long value for the s_ViewName/Foldername options of the
    PresetFields parameter when requesting web based mail services. Any code
    supplied would run in the security context of the account running the Domino
    Web Services.

    Fix Information
    ***************
    NGSSoftware alerted IBM/Lotus to this issue on the 14th of January 2002. IBM
    Lotus Notes and Domino Release 6.0.1 is now available and being marketed as
    the first maintenance release. IBM say if customers haven't already
    upgraded or migrated to Notes and Domino 6, now is the time to move and
    start reaping the benefits of this existing and highly praised release.
    Release 6.0.1 includes fixes to enhance the quality and reliability of the
    Notes and Domino 6 products. It does not however mention any security
    issues, and NGS would strongly advise to upgrade as soon as possible not to
    just to "reap the benefits" but to secure the server and data against
    possible attacks.

    The upgrade / patch can be obtained from

    http://www14.software.ibm.com/webapp/download/search.jsp?q=&cat=&pf=&k=&dt</a> <a href="index.html#28">[ thread A check for this issue has been added to DominoScan R2, a comprehensive
    go=y&rs=ESD-NOTECLNTi&S_TACT=&S_CMP=&sb=r

    A check for this issue has been added to DominoScan R2, a comprehensive
    automated intelligent assessment tool for Lotus Domino Servers of which more
    information is available from the NGSSite

    http://www.ngssoftware.com/software/dominoscan.html

    Further Information
    *******************
    For further information about the scope and effects of buffer overflows,
    please see

    http://www.ngssoftware.com/papers/non-stack-bo-windows.pdf
    http://www.ngssoftware.com/papers/ntbufferoverflow.html
    http://www.ngssoftware.com/papers/bufferoverflowpaper.rtf
    http://www.ngssoftware.com/papers/unicodebo.pdf

    About NGSSoftware
    *****************
    NGSSoftware design, research and develop intelligent, advanced application
    security assessment scanners. Based in the United Kingdom, NGSSoftware have
    offices in the South of London and the East Coast of Scotland. NGSSoftware's
    sister company NGSConsulting, offers best of breed security consulting
    services, specialising in application, host and network security
    assessments.

    http://www.ngssoftware.com/
    http://www.ngsconsulting.com/

    Telephone +44 208 401 0070
    Fax +44 208 401 0076

    enquiries@ngssoftware.com