Home    |    View Topics    |    Search    |    Contact Us    |   



Category:   Application (Generic)  >   IBM iNotes and Domino Vendors:   IBM
IBM Lotus Notes Buffer Overflows in Processing Lotus 1-2-3 Attachments Let Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1019002
SecurityTracker URL:
CVE Reference:   CVE-2007-6593   (Links to External Site)
Updated:  Feb 1 2008
Original Entry Date:  Nov 27 2007
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.0, 6.5, 7.0, 8.0
Description:   A vulnerability was reported in IBM Lotus Notes. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create a specially crafted Lotus 1-2-3 file that, when viewed by the target user, will trigger a buffer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target user.

Only Windows-based Notes clients are affected. The Domino server is not affected.

The vulnerability resides in the 3rd party Autonomy Verity KeyView SDK, which is used by Lotus Notes to process Lotus 1-2-3 file attachments.

Other applications that use the Verity KeyView SDK may be affected.

The vendor was notified on September 17, 2007.

Sebastian Muniz from the CORE IMPACT Exploit Writers Team (EWT) reported this vulnerability.

The original advisory is available at:

[Editor's note: A separate Alert (Alert ID 1019054) has been issued covering the Autonomy Verity KeyView SDK.]

Impact:   A remote user can create a file that, when viewed by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a patch for Notes 7.x and 8.x.

The vendor has described a workaround for Notes 5.x and 6.x in their advisory.

The IBM advisory is available at:

Vendor URL: (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.

 Source Message Contents

[Original Message Not Available for Viewing]

Go to the Top of This SecurityTracker Archive Page

Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, LLC