Overview
The Lotus Domino Web Server contains a flaw that could be exploited to cause a denial of service.
Description
A continuous stream of "connect" requests with a payload of 10K of data to TCP port 63148 (DIIOP - CORBA) will result in 100% CPU usage, the hard disk constantly being written to, and the memory slowly filling. The CPU usage will remain at 100% long after the attack is over. |
Impact
Intruders can consume disk space, memory, and CPU cycles, possibly interrupting the normal operations of the Domino server. |
Solution
Upgrade to Notes/Domino 5.0.7 or later. See http://www.notes.net/qmrdown.nsf/QMRWelcome. |
Restrict access to port 63148 to trusted users if possible using a firewall or router. Change the default DIIOP listening port from 63148. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Our thanks to Defcom Labs, which published an advisory on this and other problems, available at http://www.securityfocus.com/frames/?content=/templates/advisory.html?id=3208.
This document was written by Jason Rafail and is based on information obtained from a Defcom Labs Advisory.
Other Information
CVE IDs: | None |
Severity Metric: | 4.25 |
Date Public: | 2001-04-11 |
Date First Published: | 2001-07-12 |
Date Last Updated: | 2001-07-17 19:13 UTC |
Document Revision: | 22 |