Published:
19 February 2003
Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2003.0101 -- NGSSoftware Insight Security Research Advisories NISR17022003a and NISR17022003b Multiple Vulnerabilities in Lotus Domino Web Server 19 February 2003 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Lotus Domino Web Server Release 6.0 Vendor: Lotus Software (IBM Software Group) Impact: Execute Arbitrary Code/Commands Access Required: Remote Comment: Bulletins included are: NISR17022003a - Lotus Domino Web Server Host/Location Buffer Overflow Vulnerability NISR17022003b - Lotus Domino Web Server iNotes Overflow The URL provided in the following bulletin for the upgrade / patch is incorrect. The correct URL for the Domino Web Server Update can be found at: http://www14.software.ibm.com/webapp/download/search.jsp?go=y&rs=ESD-DMNTSRVRi&sb=r - --------------------------BEGIN INCLUDED TEXT-------------------- NGSSoftware Insight Security Research Advisory Name: Lotus Domino Web Server Host/Location Buffer Overflow Vulnerability Systems Affected: Release 6.0 Severity: Critical Risk Category: Remote System Buffer Overrun Vendor URL: http://www.lotus.com Author: Mark Litchfield (mark@ngssoftware.com) Date: 17th February 2003 Advisory number: #NISR17022003a Description *********** Lotus Domino and Notes together provide a featured enterprise collaboration system with Domino providing application server services. Details ******* Lotus Domino 6 suffers from a remotley exploitable buffer overrun vulnerability when performing a redirect operation. When building the 302 Redirect response, the server takes the client provided "Host" header and implants this value into the "Location" server header. By requesting certain documents or views in certain databases the server can be forced to perform a redirect operation and by supplying an overly long string for the hostname, a buffer can be overflowed allowing an attacker to gain control of the Domino Web Services process. By default these databases can be accessed by anonymous users. Any arbitray code supplied will run in the context of the account running Domino allowing an attacker to gain control of the server. Fix Information *************** IBM Lotus Notes and Domino Release 6.0.1 is now available and being marketed as the first maintenance release. IBM say if customers haven't already upgraded or migrated to Notes and Domino 6, now is the time to move and start reaping the benefits of this existing and highly praised release. Release 6.0.1 includes fixes to enhance the quality and reliability of the Notes and Domino 6 products. It does not however mention any security issues, and NGS would strongly advise to upgrade as soon as possible not to just tp "reap the benefits" but to secure the server and data against possible attacks. The upgrade / patch can be obtained from http://www14.software.ibm.com/webapp/download/search.jsp?q=&cat=&pf=&k=&dt=& go=y&rs=ESD-NOTECLNTi&S_TACT=&S_CMP=&sb=r A check for this issue has been added to DominoScan R2, a comprehensive automated intelligent assessment tool for Lotus Domino Servers of which more information is available from the NGSSite http://www.ngssoftware.com/software/dominoscan.html Further Information ******************* For further information about the scope and effects of buffer overflows, please see http://www.ngssoftware.com/papers/non-stack-bo-windows.pdf http://www.ngssoftware.com/papers/ntbufferoverflow.html http://www.ngssoftware.com/papers/bufferoverflowpaper.rtf http://www.ngssoftware.com/papers/unicodebo.pdf About NGSSoftware ***************** NGSSoftware design, research and develop intelligent, advanced application security assessment scanners. Based in the United Kingdom, NGSSoftware have offices in the South of London and the East Coast of Scotland. NGSSoftware's sister company NGSConsulting, offers best of breed security consulting services, specialising in application, host and network security assessments. http://www.ngssoftware.com/ http://www.ngsconsulting.com/ Telephone +44 208 401 0070 Fax +44 208 401 0076 enquiries@ngssoftware.com NGSSoftware Insight Security Research Advisory Name: Lotus Domino Web Server iNotes Overflow Systems Affected: Release 6.0 Severity: Critical Risk Category: Remote System Buffer Overrun Vendor URL: http://www.lotus.com Author: Mark Litchfield (mark@ngssoftware.com) Date: 17th February 2003 Advisory number: #NISR17022003b Description *********** Lotus Domino and Notes together provide a featured enterprise collaboration system with Domino providing application server services. iNotes provides web based messaging facilities. Details ******* iNotes suffers from a remotley exploitable buffer overrun when an attacker provides an overly long value for the s_ViewName/Foldername options of the PresetFields parameter when requesting web based mail services. Any code supplied would run in the security context of the account running the Domino Web Services. Fix Information *************** NGSSoftware alerted IBM/Lotus to this issue on the 14th of January 2002. IBM Lotus Notes and Domino Release 6.0.1 is now available and being marketed as the first maintenance release. IBM say if customers haven't already upgraded or migrated to Notes and Domino 6, now is the time to move and start reaping the benefits of this existing and highly praised release. Release 6.0.1 includes fixes to enhance the quality and reliability of the Notes and Domino 6 products. It does not however mention any security issues, and NGS would strongly advise to upgrade as soon as possible not to just to "reap the benefits" but to secure the server and data against possible attacks. The upgrade / patch can be obtained from http://www14.software.ibm.com/webapp/download/search.jsp?q=&cat=&pf=&k=&dt=& go=y&rs=ESD-NOTECLNTi&S_TACT=&S_CMP=&sb=r A check for this issue has been added to DominoScan R2, a comprehensive automated intelligent assessment tool for Lotus Domino Servers of which more information is available from the NGSSite http://www.ngssoftware.com/software/dominoscan.html Further Information ******************* For further information about the scope and effects of buffer overflows, please see http://www.ngssoftware.com/papers/non-stack-bo-windows.pdf http://www.ngssoftware.com/papers/ntbufferoverflow.html http://www.ngssoftware.com/papers/bufferoverflowpaper.rtf http://www.ngssoftware.com/papers/unicodebo.pdf About NGSSoftware ***************** NGSSoftware design, research and develop intelligent, advanced application security assessment scanners. Based in the United Kingdom, NGSSoftware have offices in the South of London and the East Coast of Scotland. NGSSoftware's sister company NGSConsulting, offers best of breed security consulting services, specialising in application, host and network security assessments. http://www.ngssoftware.com/ http://www.ngsconsulting.com/ Telephone +44 208 401 0070 Fax +44 208 401 0076 enquiries@ngssoftware.com - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to use any or all of this information is the responsibility of each user or organisation, and should be done so in accordance with site policies and procedures. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: http://www.auscert.org.au/render.html?cid=1980 If you believe that your system has been compromised, contact AusCERT or your representative in FIRST (Forum of Incident Response and Security Teams). Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. -----BEGIN PGP SIGNATURE----- Version: 2.6.3i Charset: noconv Comment: http://www.auscert.org.au/render.html?it=1967 iQCVAwUBPlNZXyh9+71yA2DNAQFN4AP7BdwO3PcXJaPJyYjqaHIZlw89ng8CJwLu VtTnd4QDjygtXlk8v7JXjcMvIkoCbf9Va8wjMJgcGlPTlv2ILcPlOhtL3qsywlSt rxXHvMhZUKylknThm8tNNPE5HVacASzrEinpIcaxr6I+hVRpTlbqd60gz41WkVpZ HAOkipojLkA= =vd6w -----END PGP SIGNATURE-----