Overview
Lotus Notes JVM leaks information about the existence of a file.
Description
A malicious Java applet run in the Lotus Notes web browser can determine if a local file exists. Notes' preferences must be set to browse the web using the Notes browser, with execution of Java applets enabled. When a Java applet tries to access local files, Lotus Notes presents a dialog box to the user asking whether access should be allowed. It only presents this dialog after checking if the local file exists; if it does not exist, the dialog is not shown. Thus, if the applet can determine whether the dialog was shown, it will know whether the file exists. |
Impact
By checking for the existence of certain files, an attacker can learn what software is installed and what programs have been executed recently on the client machine. However, the attacker cannot read or modify any files through this vulnerability. |
Solution
Lotus plans to fix this issue in a future release of Notes. |
Disable execution of Java applets in Notes preferences. For more details, see http://www-1.ibm.com/support/docview.wss?uid=swg21102440. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Hiromitsu Takagi for reporting this vulnerability.
This document was written by Shawn Van Ittersum.
Other Information
CVE IDs: | CVE-2000-1117 |
Severity Metric: | 0.06 |
Date Public: | 2000-11-28 |
Date First Published: | 2001-05-14 |
Date Last Updated: | 2006-03-30 15:44 UTC |
Document Revision: | 16 |