Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   


Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Become a Partner and License Our Database or Notification Service
Report a Bug
Report a vulnerability that you have found to SecurityTracker

Category:   Application (Web Server/CGI)  >   IBM iNotes and Domino Vendors:   IBM
IBM Domino Server Buffer Overflow in Date/Time Field Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1013695
SecurityTracker URL:
CVE Reference:   GENERIC-MAP-NOMATCH   (Links to External Site)
Date:  Apr 13 2005
Impact:   Denial of service via network, Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.0.5, 6.5.4
Description:   A vulnerability was reported in IBM's Domino Server. A remote user can cause denial of service conditions or cause arbitrary code to be executed.

A remote user can submit specially crafted date/time fields via an HTTP POST request to trigger a buffer overflow and execute arbitrary code.

Mark Litchfield of NGSSoftware discovered this vulnerability.

Impact:   A remote user can cause arbitrary code to be executed on the target system.

A remote user can cause the target service to crash.

Solution:   The vendor has issued a fixed version (6.0.5 / 6.5.4 MR). The vendor's advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (NT), Windows (2000)

Message History:   None.

 Source Message Contents

Date:  Tue, 12 Apr 2005 18:02:19 +0100
Subject:  Remote Buffer Overflow in Lotus Domino

Mark Litchfield of NGSSoftware has discovered a high risk vulnerability in
Lotus Domino Server.

Versions affected include:

Domino 6.0.5
Domino 6.5.4

The flaw permits execution of arbitrary code via a maliciously crafted POST
request.  Internal research

has discovered to date, 6 attack vectors.

This issue has been resolved in Lotus Domino as detailed at

It can be downloaded from:

NGSSoftware are going to withhold details of this flaw for three months.
Full details
will be published on the 12th of July 2005. This three month window will
allow users of
Lotus Domino the time needed to apply the patch before the details are
released to the general
public. This reflects NGSSoftware's approach to responsible disclosure.

NGSSoftware Insight Security Research
+44(0)208 401 0070

NTBugtraq Editor's Note:

Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived
 sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may
 receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such
 notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.


Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

Copyright 2017, LLC