|
|
PROBLEM: At the DefCon 8 convention in Las Vegas, NV (July 28-30, 2000)
some consultants described and demonstrated vulnerabilities in
Lotus Notes Domino. The vulnerabilities involve poor encryption
on the http password, cached passwords, and a vulnerability to
malicious code when Internet Explorer is used as the reader.
The first two vulnerabilities require physical access to the
machine being attacked while the last concerns problems generic
to Internet Explorer.
PLATFORM: Lotus Notes Domino Servers and Clients.
DAMAGE: Intruders can gain access to a user’s account.
SOLUTION: Upgrade the encryption of the Notes http passwords, do not
leave a system unattended while it is logged into Notes, and do
not run applications that are unexpectedly attached to web
pages or mail documents. See the note below and the Lotus
security pages (www.lotus.com/security) for more details.
VULNERABILITY Low - These vulnerabilities require physical access to the
ASSESSMENT: machine being attacked or they require that you allow malicious
applets and attachments to run.
|
Comments on DefCon 8.0 Presentation on Domino
Security Vulnerability
Preconditions:
This vulnerability does not affect all Notes/Domino installations and can be easily
prevented. In order for this type of exploit to be successful, all of the following
conditions must be met: Solution: System administrators can easily upgrade to a stronger http password format using a tool introduced in R4.6. To do so, select all person documents in the Domino Directory (names.nsf), and then from the menu, select Actions\Upgrade to More Secure Internet Password Format. Assertion 2: Using F5 to lock the Notes ID (or specifying a timeout for the Notes ID) does not completely clear the password in all situations. In certain circumstances, Notes API programs running on the local workstation can access files using the cached credentials. These credentials allow background replication and agent execution to take place unattended. Preconditions:
This problem affects any program, not just Notes, running on an operating system
that does not support protected memory segments. A malicious user must have
physical access to the workstation and sophisticated programming tools must be used.
Preconditions:
When the default browser in Notes is configured to use "Notes with Internet
Explorer", it is subject to the types of attacks that can affect Internet
Explorer as a stand-alone product. If the user ignores ActiveX warnings generated
by Internet Explorer (example shown below), the user may be vulnerable to malicious
active content.
|
Voice: +1 925-422-8193 (7 x 24)
FAX: +1 925-423-8002
STU-III: +1 925-423-2604
E-mail: ciac@llnl.gov
World Wide Web: http://www.ciac.org/
http://ciac.llnl.gov
(same machine -- either one will work)
Anonymous FTP: ftp.ciac.org
ciac.llnl.gov
(same machine -- either one will work)