SecurityTracker.com
Keep Track of the Latest Vulnerabilities
with SecurityTracker!
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 
Sign Up
Sign Up for Your FREE Weekly SecurityTracker E-mail Alert Summary
Instant Alerts
Buy our Premium Vulnerability Notification Service to receive customized, instant alerts
Affiliates
Put SecurityTracker Vulnerability Alerts on Your Web Site -- It's Free!
Partners
Become a Partner and License Our Database or Notification Service





Category:   Application (Generic)  >   IBM iNotes and Domino Vendors:   IBM
IBM Lotus Notes Buffer Overflows in HTML Speed Reader Lets Remote Users Execute Arbitrary Code
SecurityTracker Alert ID:  1019843
SecurityTracker URL:  http://securitytracker.com/id/1019843
CVE Reference:   CVE-2008-0066   (Links to External Site)
Date:  Apr 14 2008
Impact:   Execution of arbitrary code via network, User access via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 6.0, 6.5, 7.0
Description:   A vulnerability was reported in IBM Lotus Notes in the HTML Speed Reader. A remote user can cause arbitrary code to be executed on the target user's system.

A remote user can create specially crafted HTML that, when viewed by the target user, will trigger a buffer overflow and execute arbitrary code on the target system. The code will run with the privileges of the target user.

The vulnerability resides in 'htmsr.dll'.

Specially crafted BODY tag 'background' attribute values can trigger a stack overflow.

Specially crafted IMG tag 'src' attribute values can trigger a stack overflow.

Specially crafted chunks of data can trgger a heap overflow.

The vendor was notified on January 7, 2008.

The vendor has assigned SPR# PRAD7AP563 to this vulnerability.

Secunia Research reported this vulnerability.

Impact:   A remote user can create HTML that, when viewed by the target user, will execute arbitrary code on the target user's system.
Solution:   The vendor has issued a patch, available via IBM Support.

The vendor's advisory is available at:

http://www-1.ibm.com/support/docview.wss?uid=swg21298453

Vendor URL:  www-1.ibm.com/support/docview.wss?uid=swg21298453 (Links to External Site)
Cause:   Boundary error
Underlying OS:  Windows (Any)

Message History:   None.


 Source Message Contents

Subject:  Secunia Research: Lotus Notes htmsr.dll Buffer Overflows

====================================================================== 

                     Secunia Research 08/04/2008

              - Lotus Notes htmsr.dll Buffer Overflows -

====================================================================== 
Table of Contents

Affected Software....................................................1
Severity.............................................................2
Vendor's Description of Software.....................................3
Description of Vulnerability.........................................4
Solution.............................................................5
Time Table...........................................................6
Credits..............................................................7
References...........................................................8
About Secunia........................................................9
Verification........................................................10

====================================================================== 
1) Affected Software 

* Lotus Notes 7.0.2 and 7.0.3

NOTE: Other versions may also be affected.

====================================================================== 
2) Severity 

Rating: Highly critical
Impact: System compromise
Where:  Remote

====================================================================== 
3) Vendor's Description of Software 

"Security-rich software that enables businesses to communicate,
collaborate and increase productivity."

Product Link:
http://www-306.ibm.com/software/lotus/ 

====================================================================== 
4) Description of Vulnerability

Secunia Research has discovered some vulnerabilities in Lotus Notes,
which can be exploited by malicious people to compromise a user's
system.

1) A boundary error within the HTML speed reader (htmsr.dll) when
handling links in e.g. the "background" attribute of <BODY> tags can 
be exploited to cause a stack-based buffer overflow.

2) A boundary error within the HTML speed reader (htmsr.dll) when
handling e.g. the "src" attribute of <IMG> tags can be exploited to
cause a stack-based buffer overflow.

3) A boundary error within the HTML speed reader (htmsr.dll) when
handling large chunks of data inside an HTML document can be exploited
to cause a heap-based buffer overflow.

====================================================================== 
5) Solution 

Apply patch available from the vendor.

====================================================================== 
6) Time Table 

07/01/2008 - Vendor notified.
07/01/2008 - Vendor response.
08/04/2008 - Public disclosure.

====================================================================== 
7) Credits 

Discovered by Secunia Research.

====================================================================== 
8) References

The Common Vulnerabilities and Exposures (CVE) project has assigned 
CVE-2008-0066 for the vulnerabilities.

====================================================================== 
9) About Secunia

Secunia offers vulnerability management solutions to corporate
customers with verified and reliable vulnerability intelligence
relevant to their specific system configuration:

http://corporate.secunia.com/

Secunia also provides a publicly accessible and comprehensive advisory
database as a service to the security community and private 
individuals, who are interested in or concerned about IT-security.

http://secunia.com/

Secunia believes that it is important to support the community and to
do active vulnerability research in order to aid improving the 
security and reliability of software in general:

http://corporate.secunia.com/secunia_research/33/

Secunia regularly hires new skilled team members. Check the URL below
to see currently vacant positions:

http://secunia.com/secunia_vacancies/

Secunia offers a FREE mailing list called Secunia Security Advisories:

http://secunia.com/secunia_security_advisories/ 

====================================================================== 
10) Verification 

Please verify this advisory by visiting the Secunia website:
http://secunia.com/secunia_research/2008-3/

Complete list of vulnerability reports published by Secunia Research:
http://secunia.com/secunia_research/

======================================================================

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2018, SecurityGlobal.net LLC