TUCoPS :: Web :: Servers :: web5993.htm

Lotus Domino Web Server Host/Location Buffer Overflow Vulnerability
17th Feb 2003 [SBWID-5993]
COMMAND

	Lotus Domino Web Server Host/Location Buffer Overflow Vulnerability

SYSTEMS AFFECTED

	Lotus Domino Release 6.0

PROBLEM

	Thanks to  David  Litchfield  [david@ngssoftware]  and  Mark  Litchfield
	[mark@ngssoftware.com]  of  NGSSoftware   Insight   Security   Research,
	advisory [#NISR17022003a] :
	
	Lotus  Domino  and  Notes  together  provide   a   featured   enterprise
	collaboration system with Domino providing application server services.
	
	 Details
	 *******
	
	Lotus Domino 6  suffers  from  a  remotley  exploitable  buffer  overrun
	vulnerability when performing a redirect operation.  When  building  the
	302 Redirect response, the  server  takes  the  client  provided  "Host"
	header and implants this value into the  "Location"  server  header.  By
	requesting certain documents or views in certain  databases  the  server
	can be forced to perform  a  redirect  operation  and  by  supplying  an
	overly long  string  for  the  hostname,  a  buffer  can  be  overflowed
	allowing an  attacker  to  gain  control  of  the  Domino  Web  Services
	process. By default these databases can be accessed by anonymous  users.
	Any arbitray code supplied will  run  in  the  context  of  the  account
	running Domino allowing an attacker to gain control of the server.

SOLUTION

	 Fix Information
	 ***************
	
	IBM Lotus Notes and Domino Release 6.0.1  is  now  available  and  being
	marketed as the first maintenance release. IBM say if customers  haven't
	already upgraded or migrated to Notes and Domino 6, now is the  time  to
	move and start reaping the benefits of this existing and highly  praised
	release. Release  6.0.1  includes  fixes  to  enhance  the  quality  and
	reliability of the Notes and Domino 6  products.  It  does  not  however
	mention any security issues, and NGS would strongly  advise  to  upgrade
	as soon as possible not to just tp "reap the  benefits"  but  to  secure
	the server and data against possible attacks.
	
	The upgrade / patch can be obtained from
	
	http://www14.software.ibm.com/webapp/download/search.jsp?q=&cat=&pf=&k=&dt=&
	go=y&rs=ESD-DMNTSRVRi&S_TACT=&S_CMP=&sb=r
	
	A check for this issue has been added to DominoScan R2, a  comprehensive
	automated intelligent assessment tool for Lotus Domino Servers of  which
	more information is available from the NGSSite
	
	http://www.ngssoftware.com/software/dominoscan.html
	
	
	 Further Information
	 *******************
	
	For further information about the scope and effects of buffer overflows,
	please see
	
	http://www.ngssoftware.com/papers/non-stack-bo-windows.pdf
	http://www.ngssoftware.com/papers/ntbufferoverflow.html
	http://www.ngssoftware.com/papers/bufferoverflowpaper.rtf
	http://www.ngssoftware.com/papers/unicodebo.pdf
	
	 About NGSSoftware
	 *****************
	
	NGSSoftware design, research and develop intelligent, advanced application
	security assessment scanners. Based in the United Kingdom, NGSSoftware have
	offices in the South of London and the East Coast of Scotland. NGSSoftware's
	sister company NGSConsulting, offers best of breed security consulting
	services, specialising in application, host and network security
	assessments.
	
	http://www.ngssoftware.com/
	http://www.ngsconsulting.com/
	
	Telephone +44 208 401 0070
	Fax +44 208 401 0076
	
	enquiries@ngssoftware.com
	

TUCoPS is optimized to look best in Firefox® on a widescreen monitor (1440x900 or better).
Site design & layout copyright © 1986-2024 AOH