CVE-2002-1624
CVSS5.0
发布时间 :2002-12-31 00:00:00
修订时间 :2008-09-05 16:31:06
NMCOS    

[原文]Buffer overflow in Lotus Domino web server before R5.0.10, when logging to DOMLOG.NSF, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a long HTTP Authenticate header containing certain non-ASCII characters.


[CNNVD]Lotus Domino HTTP验证日志记录远程缓冲区溢出漏洞(CNNVD-200212-146)

        
        Lotus Domino服务器是一款基于WEB合作的应用程序架构,运行在Linux/Unix和Microsoft Windows操作系统平台下。
        当HTTP验证数据记录到'DOMLOG.NSF'数据库时缺少正确缓冲区边界检查,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以Lotus Domino服务进程权限在系统上执行任意指令。
        Lotus Domino服务器在验证过程中存在一个缓冲区溢出问题,当服务程序允许记录日志到'DOMLOG.NSF'时,如果攻击者提交超长包含部分非ASCII字符的HTTP验证信息给服务器时,可使服务程序崩溃,精心构建提交的HTTP验证数据可能以Lotus Domino服务进程权限在系统上执行任意指令。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: NONE [对系统的机密性无影响]
完整性影响: NONE [不会对系统完整性产生影响]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: [--]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:ibm:lotus_domino:5.0.9IBM Lotus Domino 5.0.9
cpe:/a:ibm:lotus_domino:5.0IBM Lotus Domino 5.0
cpe:/a:ibm:lotus_domino:5.0.2IBM Lotus Domino 5.0.2
cpe:/a:ibm:lotus_domino:5.0.1IBM Lotus Domino 5.0.1
cpe:/a:ibm:lotus_domino:5.0.4::solaris
cpe:/a:ibm:lotus_domino:5.0.6aIBM Lotus Domino 5.0.6a
cpe:/a:ibm:lotus_domino:5.0.8IBM Lotus Domino 5.0.8
cpe:/a:ibm:lotus_domino:5.0.7::solaris
cpe:/a:ibm:lotus_domino:5.0.3IBM Lotus Domino 5.0.3
cpe:/a:ibm:lotus_domino:5.0.4aIBM Lotus Domino 5.0.4a
cpe:/a:ibm:lotus_domino:5.0.5IBM Lotus Domino 5.0.5
cpe:/a:ibm:lotus_domino:5.0.7aIBM Lotus Domino 5.0.7a
cpe:/a:ibm:lotus_domino:5.0.9aIBM Lotus Domino 5.0.9a
cpe:/a:ibm:lotus_domino:5.0.6IBM Lotus Domino 5.0.6

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2002-1624
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2002-1624
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200212-146
(官方数据源) CNNVD

- 其它链接及资源

http://www.kb.cert.org/vuls/id/772563
(UNKNOWN)  CERT-VN  VU#772563
http://www.securityfocus.com/bid/6646
(PATCH)  BID  6646
http://xforce.iss.net/xforce/xfdb/11058
(UNKNOWN)  XF  lotus-domino-authentication-bo(11058)
http://securitytracker.com/id?1004052
(UNKNOWN)  SECTRACK  1004052

- 漏洞信息

Lotus Domino HTTP验证日志记录远程缓冲区溢出漏洞
中危 边界条件错误
2002-12-31 00:00:00 2005-10-20 00:00:00
远程  
        
        Lotus Domino服务器是一款基于WEB合作的应用程序架构,运行在Linux/Unix和Microsoft Windows操作系统平台下。
        当HTTP验证数据记录到'DOMLOG.NSF'数据库时缺少正确缓冲区边界检查,远程攻击者可以利用这个漏洞进行缓冲区溢出攻击,可能以Lotus Domino服务进程权限在系统上执行任意指令。
        Lotus Domino服务器在验证过程中存在一个缓冲区溢出问题,当服务程序允许记录日志到'DOMLOG.NSF'时,如果攻击者提交超长包含部分非ASCII字符的HTTP验证信息给服务器时,可使服务程序崩溃,精心构建提交的HTTP验证数据可能以Lotus Domino服务进程权限在系统上执行任意指令。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 建议用户把日志记录到文本文件而不是'DOMLOG.NSF'数据库中。
        厂商补丁:
        Lotus
        -----
        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        IBM Upgrade Lotus Domino 5.0.10
        
        http://www.notes.net/qmrdown.nsf

- 漏洞信息

19097
IBM Lotus Domino Web Server DOMLOG.NSF Logging HTTP Authenticate Header Overflow
Input Manipulation
Loss of Integrity
Exploit Commercial

- 漏洞描述

Unknown or Incomplete

- 时间线

2002-04-23 Unknow
Unknow Unknow

- 解决方案

Unknown or Incomplete

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

Lotus Domino HTTP Authentication Logging Buffer Overflow Vulnerability
Boundary Condition Error 6646
Yes No
2002-04-16 12:00:00 2008-04-04 01:39:00
Discovery of this issue is credited to The Relay Group.

- 受影响的程序版本

Lotus Domino 5.0.9 a
Lotus Domino 5.0.9
Lotus Domino 5.0.8
Lotus Domino 5.0.7 a
Lotus Domino 5.0.7
- HP HP-UX 9.9
- HP HP-UX 9.9
- IBM AIX 4.3
- IBM AIX 4.3
- IBM OS/2 4.5 Warp
- IBM OS/2 4.5 Warp
- IBM OS/390 V2R9
- IBM OS/390 V2R9
- Linux kernel 2.3
- Linux kernel 2.3
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- Sun Solaris 8_sparc
- Sun Solaris 8_sparc
Lotus Domino 5.0.6 a
Lotus Domino 5.0.6
- HP HP-UX 9.9
- HP HP-UX 9.9
- IBM AIX 4.3
- IBM AIX 4.3
- IBM OS/2 4.5 Warp
- IBM OS/2 4.5 Warp
- IBM OS/390 V2R9
- IBM OS/390 V2R9
- Linux kernel 2.3
- Linux kernel 2.3
- Microsoft Windows 2000 Professional SP2
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional SP1
- Microsoft Windows 2000 Professional
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6a
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP6
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP5
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP4
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP3
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP2
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0 SP1
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- Sun Solaris 8_sparc
- Sun Solaris 8_sparc
Lotus Domino 5.0.5
- HP HP-UX 9.9
- HP HP-UX 9.9
- IBM AIX 4.3
- IBM AIX 4.3
- IBM OS/2 4.5 Warp
- IBM OS/2 4.5 Warp
- IBM OS/390 V2R9
- IBM OS/390 V2R9
- Linux kernel 2.3
- Linux kernel 2.3
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- Sun Solaris 8_sparc
- Sun Solaris 8_sparc
Lotus Domino 5.0.4 a
Lotus Domino 5.0.4
- HP HP-UX 9.9
- HP HP-UX 9.9
- IBM AIX 4.3
- IBM AIX 4.3
- IBM OS/2 4.5 Warp
- IBM OS/2 4.5 Warp
- IBM OS/390 V2R9
- IBM OS/390 V2R9
- Linux kernel 2.3
- Linux kernel 2.3
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- Sun Solaris 8_sparc
- Sun Solaris 8_sparc
Lotus Domino 5.0.3
- HP HP-UX 9.9
- HP HP-UX 9.9
- IBM AIX 4.3
- IBM AIX 4.3
- IBM OS/2 4.5 Warp
- IBM OS/2 4.5 Warp
- IBM OS/390 V2R9
- IBM OS/390 V2R9
- Linux kernel 2.3
- Linux kernel 2.3
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- Sun Solaris 8_sparc
- Sun Solaris 8_sparc
Lotus Domino 5.0.2
- HP HP-UX 9.9
- HP HP-UX 9.9
- IBM AIX 4.3
- IBM AIX 4.3
- IBM OS/2 4.5 Warp
- IBM OS/2 4.5 Warp
- IBM OS/390 V2R9
- IBM OS/390 V2R9
- Linux kernel 2.3
- Linux kernel 2.3
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- Sun Solaris 8_sparc
- Sun Solaris 8_sparc
Lotus Domino 5.0.1
- HP HP-UX 9.9
- HP HP-UX 9.9
- IBM AIX 4.3
- IBM AIX 4.3
- IBM OS/2 4.5 Warp
- IBM OS/2 4.5 Warp
- IBM OS/390 V2R9
- IBM OS/390 V2R9
- Linux kernel 2.3
- Linux kernel 2.3
- Microsoft Windows 2000 Professional
- Microsoft Windows NT 4.0
- Microsoft Windows NT 4.0
- Sun Solaris 8_sparc
- Sun Solaris 8_sparc
Lotus Domino 5.0
Lotus Domino 5.0.10

- 不受影响的程序版本

Lotus Domino 5.0.10

- 漏洞讨论

Lotus Domino is prone to a remotely exploitable buffer-overflow condition. This issue occurs because of insufficient bounds-checking when HTTP Authentication data is logged to the 'DOMLOG.NSF' database. Remote attackers can corrupt sensitive regions of memory with attacker-supplied values, possibly allowing arbitrary code to run.

- 漏洞利用

DSquare Security has developed a working commercial exploit for its D2 Exploitation Pack product. This exploit is not otherwise publicly available or known to be circulating in the wild.

- 解决方案

Fixes are available:


Lotus Domino 5.0

Lotus Domino 5.0.1

Lotus Domino 5.0.2

Lotus Domino 5.0.3

Lotus Domino 5.0.4 a

Lotus Domino 5.0.4

Lotus Domino 5.0.5

Lotus Domino 5.0.6

Lotus Domino 5.0.6 a

Lotus Domino 5.0.7

Lotus Domino 5.0.7 a

Lotus Domino 5.0.8

Lotus Domino 5.0.9

Lotus Domino 5.0.9 a

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站