IBM Domino Server Buffer Overflow in Date/Time Field Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID: 1013695|
SecurityTracker URL: http://securitytracker.com/id/1013695
(Links to External Site)
Date: Apr 13 2005
Denial of service via network, Execution of arbitrary code via network, User access via network|
Fix Available: Yes Vendor Confirmed: Yes |
Version(s): 6.0.5, 6.5.4|
A vulnerability was reported in IBM's Domino Server. A remote user can cause denial of service conditions or cause arbitrary code to be executed.|
A remote user can submit specially crafted date/time fields via an HTTP POST request to trigger a buffer overflow and execute arbitrary code.
Mark Litchfield of NGSSoftware discovered this vulnerability.
A remote user can cause arbitrary code to be executed on the target system.|
A remote user can cause the target service to crash.
The vendor has issued a fixed version (6.0.5 / 6.5.4 MR). The vendor's advisory is available at:|
Vendor URL: www-1.ibm.com/support/docview.wss?rs=463&uid=swg21202431 (Links to External Site)
|Underlying OS: Linux (Any), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (NT), Windows (2000)|
Source Message Contents
Date: Tue, 12 Apr 2005 18:02:19 +0100|
Subject: Remote Buffer Overflow in Lotus Domino
Mark Litchfield of NGSSoftware has discovered a high risk vulnerability in
Lotus Domino Server.
Versions affected include:
The flaw permits execution of arbitrary code via a maliciously crafted POST
request. Internal research
has discovered to date, 6 attack vectors.
This issue has been resolved in Lotus Domino as detailed at
It can be downloaded from:
NGSSoftware are going to withhold details of this flaw for three months.
will be published on the 12th of July 2005. This three month window will
allow users of
Lotus Domino the time needed to apply the patch before the details are
released to the general
public. This reflects NGSSoftware's approach to responsible disclosure.
NGSSoftware Insight Security Research
+44(0)208 401 0070
NTBugtraq Editor's Note:
Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived
sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may
receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such
notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.