[38323] in bugtraq

home help back first fref pref prev next nref lref last post

Remote Buffer Overflow in Lotus Domino

daemon@ATHENA.MIT.EDU (Next Generation Insight Security R)
Tue Apr 12 20:44:35 2005

Message-ID: <006701c53f81$634c6810$1b01010a@Nicky>
From: "Next Generation Insight Security Research (NGS Software)" <mark@ngssoftware.com>
To: <vulnwatch@vulnwatch.org>, <bugtraq@securityfocus.com>,
        <ntbugtraq@listserv.ntbugtraq.com>
Date: Tue, 12 Apr 2005 18:02:19 +0100
MIME-Version: 1.0
Content-Type: text/plain;
	charset="Windows-1252"
Content-Transfer-Encoding: 7bit

Mark Litchfield of NGSSoftware has discovered a high risk vulnerability in
Lotus Domino Server.

Versions affected include:

Domino 6.0.5
Domino 6.5.4

The flaw permits execution of arbitrary code via a maliciously crafted POST
request.  Internal research

has discovered to date, 6 attack vectors.

This issue has been resolved in Lotus Domino as detailed at
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21202431

It can be downloaded from:

http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21201845

NGSSoftware are going to withhold details of this flaw for three months.
Full details
will be published on the 12th of July 2005. This three month window will
allow users of
Lotus Domino the time needed to apply the patch before the details are
released to the general
public. This reflects NGSSoftware's approach to responsible disclosure.


NGSSoftware Insight Security Research
http://www.ngssoftware.com
http://www.databasesecurity.com/
http://www.nextgenss.com/
+44(0)208 401 0070


home help back first fref pref prev next nref lref last post