search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Lotus Notes and Domino COM Object Control Handler contains buffer overflow

Vulnerability Note VU#571297

Original Release Date: 2003-02-19 | Last Revised: 2003-03-26

Overview

Lotus Notes is a client application that provides access to Lotus Domino servers. A vulnerability exists that could permit a remote attacker to cause a user to execute arbitrary code.

Description

A buffer overflow vulnerability exists in the in both Lotus Notes clients and Domino Servers in a backend COM class method that handles controls. If a remote attacker could trick a victim into viewing a malicious web page or email message, the attacker could exploit this buffer overflow to execute arbitrary code on the system.

This was originally reported as a vulnerability in an iNotes ActiveX control. The vulnerable code is not iNotes or ActiveX specific, this was an attack vector, not the affected code base.

Further information is available in NGSSoftware advisory NISR17022003e and in IBM Technote 1104543 (SPR# KSPR5J2QET).

Impact

A remote attacker could crash the Notes client or Domino server and potentially execute arbitrary code on the system with the privileges of the current user. This is not Microsoft Windows platform specific and can affect other platforms.

Solution

Apply the appropriate patches from IBM Technote 1104543.

Note that the patch listed in the NGSSoftware advisory NISR17022003e is incorrect.

Vendor Information

571297
 

Lotus Software Affected

Notified:  February 17, 2003 Updated: March 17, 2003

Status

Affected

Vendor Statement

Lotus iNotes Client ActiveX Control Buffer Overrun
NISR17022003e
http://www.nextgenss.com/advisories/lotus-inotesclientaxbo.txt
SPR#: KSPR5J2QET
Status 5.x: Fixed in 5.0.13
Status 6.x: Fixed in 6.0.2
Document #: 1104543
http://www.ibm.com/support/docview.wss?rs=472&uid=swg21104543
VU#571297

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.


CVSS Metrics

Group Score Vector
Base
Temporal
Environmental

References

Acknowledgements

Thanks to Mark Litchfield for reporting this vulnerability.

This document was written by Jason A Rafail.

Other Information

CVE IDs: None
CERT Advisory: CA-2003-11
Severity Metric: 8.35
Date Public: 2003-02-17
Date First Published: 2003-02-19
Date Last Updated: 2003-03-26 17:43 UTC
Document Revision: 22

Sponsored by CISA.