CVE-2005-1442
CVSS4.6
发布时间 :2005-05-03 00:00:00
修订时间 :2008-09-05 16:49:09
NMCOS    

[原文]Buffer overflow in the Lotus Notes client for Domino 6.5 before 6.5.4 and 6.0 before 6.0.5 allows local users to cause a denial of service (client crash) and possibly execute arbitrary code via the NOTES.INI file.


[CNNVD]IBM Lotus Notes本地拒绝服务漏洞(CNNVD-200505-887)

        Lotus Domino/Notes服务器是一款基于WEB合作的应用程序架构,运行在Linux/Unix和Microsoft Windows操作系统平台下。
        Lotus Notes客户端的NOTES.INI中存在缓冲区溢出漏洞,攻击者可能利用此漏洞执行拒绝服务攻击。
        起因是在将用户提供的字符串拷贝到静态缓冲区之前没能正确的验证其长度。攻击者可以利用这个漏洞导致客户端崩溃。请注意攻击者无法远程利用这个漏洞,必须要本地访问NOTES.INI文件才能进行攻击。这个漏洞也不会导致执行代码。
        

- CVSS (基础分值)

CVSS分值: 4.6 [中等(MEDIUM)]
机密性影响: PARTIAL [很可能造成信息泄露]
完整性影响: PARTIAL [可能会导致系统文件被修改]
可用性影响: PARTIAL [可能会导致性能下降或中断资源访问]
攻击复杂度: LOW [漏洞利用没有访问限制 ]
攻击向量: LOCAL [漏洞利用需要具有物理访问权限或本地帐户]
身份认证: NONE [漏洞利用无需身份认证]

- CPE (受影响的平台与产品)

cpe:/a:ibm:lotus_notes:6.0.3IBM Lotus Notes 6.0.3
cpe:/a:ibm:lotus_notes:6.5.2IBM Lotus Notes 6.5.2
cpe:/a:ibm:lotus_notes:6.5.1IBM Lotus Notes 6.5.1
cpe:/a:ibm:lotus_notes:6.0.4IBM Lotus Notes 6.0.4
cpe:/a:ibm:lotus_notes:6.5IBM Lotus Notes 6.5
cpe:/a:ibm:lotus_notes:6.5.3IBM Lotus Notes 6.5.3
cpe:/a:ibm:lotus_notes:6.0IBM Lotus Notes 6.0
cpe:/a:ibm:lotus_notes:6.0.2IBM Lotus Notes 6.0.2
cpe:/a:ibm:lotus_notes:6.0.1IBM Lotus Notes 6.0.1

- OVAL (用于检测的技术细节)

未找到相关OVAL定义

- 官方数据库链接

http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2005-1442
(官方数据源) MITRE
http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2005-1442
(官方数据源) NVD
http://www.cnnvd.org.cn/vulnerability/show/cv_cnnvdid/CNNVD-200505-887
(官方数据源) CNNVD

- 其它链接及资源

http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21202526
(PATCH)  CONFIRM  http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21202526
http://xforce.iss.net/xforce/xfdb/20044
(UNKNOWN)  XF  lotus-notesini-bo(20044)
http://www.securityfocus.com/bid/13447
(UNKNOWN)  BID  13447
http://www.osvdb.org/15367
(VENDOR_ADVISORY)  OSVDB  15367
http://secunia.com/advisories/1013841
(UNKNOWN)  SECUNIA  1013841

- 漏洞信息

IBM Lotus Notes本地拒绝服务漏洞
中危 缓冲区溢出
2005-05-03 00:00:00 2005-10-20 00:00:00
本地  
        Lotus Domino/Notes服务器是一款基于WEB合作的应用程序架构,运行在Linux/Unix和Microsoft Windows操作系统平台下。
        Lotus Notes客户端的NOTES.INI中存在缓冲区溢出漏洞,攻击者可能利用此漏洞执行拒绝服务攻击。
        起因是在将用户提供的字符串拷贝到静态缓冲区之前没能正确的验证其长度。攻击者可以利用这个漏洞导致客户端崩溃。请注意攻击者无法远程利用这个漏洞,必须要本地访问NOTES.INI文件才能进行攻击。这个漏洞也不会导致执行代码。
        

- 公告与补丁

        目前厂商已经发布了升级补丁以修复这个安全问题,请到厂商的主页下载:
        http://www-130.ibm.com/developerworks/lotus/

- 漏洞信息

15367
IBM Lotus Notes Client NOTES.INI Processing Local Overflow
Local Access Required Denial of Service, Input Manipulation
Loss of Integrity, Loss of Availability
Exploit Unknown

- 漏洞描述

The Lotus Notes client contains a flaw that may allow a local denial of service. The issue is caused by an overflow condition triggered from processing the notes.ini configuration file, and may result in loss of availability. The issue can only be triggered by an attacker with local access to notes.ini and used to create a denial of service condition.

- 时间线

2005-04-06 Unknow
Unknow Unknow

- 解决方案

Upgrade to version 6.5.4 or 6.0.5 or higher, as it has been reported to fix this vulnerability. An upgrade is required as there are no known workarounds.

- 相关参考

- 漏洞作者

- 漏洞信息

IBM Lotus Notes Local NOTES.INI Buffer Overflow Vulnerability
Boundary Condition Error 13447
No Yes
2005-04-29 12:00:00 2009-07-12 02:06:00
Ollie Whitehouse of Symantec is credited with the discovery of this issue.

- 受影响的程序版本

IBM Lotus Notes 6.5.3
IBM Lotus Notes 6.5.2
IBM Lotus Notes 6.5.1
IBM Lotus Notes 6.5
IBM Lotus Notes 6.0.4
IBM Lotus Notes 6.0.3
IBM Lotus Notes 6.0.2
IBM Lotus Notes 6.0.1
IBM Lotus Notes 6.0
IBM Lotus Notes 6.5.4
IBM Lotus Notes 6.0.5

- 不受影响的程序版本

IBM Lotus Notes 6.5.4
IBM Lotus Notes 6.0.5

- 漏洞讨论

Lotus Notes is affected by a local buffer overflow vulnerability. This issue is due to a failure of the application to properly validate the length of user-supplied strings prior to copying them into static process buffers.

An attacker may exploit this issue to execute arbitrary code with the privileges of the user that activated the vulnerable application. This may facilitate privilege escalation.

- 漏洞利用

Currently we are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: vuldb@securityfocus.com <mailto:vuldb@securityfocus.com>.

- 解决方案

The vendor has released upgrades dealing with this issue. Users are advised to contact the vendor for more information on obtaining upgraded software. For more information, please see the reference section.

- 相关参考

 

 

关于SCAP中文社区

SCAP中文社区是国内第一个以SCAP为主题的中文开放社区。了解更多信息,请查阅[关于本站]

版权声明

CVE/CWE/OVAL均为MITRE公司的注册商标,它们的官方数据源均保存在MITRE公司的相关网站