|
PROBLEM: At the DefCon 8 convention in Las Vegas, NV (July 28-30, 2000) some consultants described and demonstrated vulnerabilities in Lotus Notes Domino. The vulnerabilities involve poor encryption on the http password, cached passwords, and a vulnerability to malicious code when Internet Explorer is used as the reader. The first two vulnerabilities require physical access to the machine being attacked while the last concerns problems generic to Internet Explorer. PLATFORM: Lotus Notes Domino Servers and Clients. DAMAGE: Intruders can gain access to a user’s account. SOLUTION: Upgrade the encryption of the Notes http passwords, do not leave a system unattended while it is logged into Notes, and do not run applications that are unexpectedly attached to web pages or mail documents. See the note below and the Lotus security pages (www.lotus.com/security) for more details.
VULNERABILITY Low - These vulnerabilities require physical access to the ASSESSMENT: machine being attacked or they require that you allow malicious applets and attachments to run.
Comments on DefCon 8.0 Presentation on Domino
Security Vulnerability
Preconditions:
This vulnerability does not affect all Notes/Domino installations and can be easily
prevented. In order for this type of exploit to be successful, all of the following
conditions must be met: Solution: System administrators can easily upgrade to a stronger http password format using a tool introduced in R4.6. To do so, select all person documents in the Domino Directory (names.nsf), and then from the menu, select Actions\Upgrade to More Secure Internet Password Format. Assertion 2: Using F5 to lock the Notes ID (or specifying a timeout for the Notes ID) does not completely clear the password in all situations. In certain circumstances, Notes API programs running on the local workstation can access files using the cached credentials. These credentials allow background replication and agent execution to take place unattended. Preconditions:
This problem affects any program, not just Notes, running on an operating system
that does not support protected memory segments. A malicious user must have
physical access to the workstation and sophisticated programming tools must be used.
Preconditions:
When the default browser in Notes is configured to use "Notes with Internet
Explorer", it is subject to the types of attacks that can affect Internet
Explorer as a stand-alone product. If the user ignores ActiveX warnings generated
by Internet Explorer (example shown below), the user may be vulnerable to malicious
active content.
|
Voice: +1 925-422-8193 (7 x 24) FAX: +1 925-423-8002 STU-III: +1 925-423-2604 E-mail: ciac@llnl.gov World Wide Web: http://www.ciac.org/ http://ciac.llnl.gov (same machine -- either one will work) Anonymous FTP: ftp.ciac.org ciac.llnl.gov (same machine -- either one will work)