Secunia CSI7
Advisories
Research
Forums
Create Profile
Our Commitment
Database
Search
Advisories by Product
Advisories by Vendor
Terminology
Report Vulnerability
Insecure Library Loading
Highly critical

IBM Lotus Notes Multiple Vulnerabilities

-

Release Date:  2006-02-10    Last Update:  2006-02-16    Views:  54,410

Secunia Advisory SA16280

Where:

From remote

Impact:

Security Bypass, System access

Solution Status:

Vendor Patch

CVE Reference(s):

Description


Secunia Research has discovered multiple vulnerabilities in Lotus Notes, which can be exploited by malicious people to bypass certain security restrictions or compromise a user's system.

1) A boundary error in kvarcve.dll when constructing the full pathname of a compressed file to check for its existence before extracting it from a ZIP archive can be exploited to cause a stack-based buffer overflow.

Successful exploitation allows execution of arbitrary code when the user extracts a compressed file with a long filename from within the Notes attachment viewer.

The vulnerability has been confirmed in version 6.5.4. Other versions may also be affected.

2) A boundary error in uudrdr.dll when handling UUE files containing an encoded file with an overly long filename can be exploited to cause a stack-based buffer overflow.

Successful exploitation allows execution of arbitrary code when a malicious UUE file is opened in the Notes attachment viewer.

The vulnerability has been confirmed in versions 6.5.4 and 7.0.

3) Directory traversal errors in kvarcve.dll when generating the preview of a compressed file from ZIP, UUE, and TAR archives can be exploited to delete arbitrary files that are accessible to the Notes user.

Successful exploitation requires that the user is e.g. tricked into previewing a compressed file with directory traversal sequences in its filename from within the Notes attachment viewer.

The vulnerability has been confirmed in versions 6.5.4 and 7.0. Prior versions may also be affected.

4) A boundary error in the TAR reader (tarrdr.dll) when extracting files from a TAR archive can be exploited to cause a stack-based buffer overflow via a TAR archive containing a file with a long filename.

Successful exploitation allows execution of arbitrary code, but requires that the user views a malicious TAR archive and chooses to extracts a compressed file to a directory with a very long path.

The vulnerability has been confirmed in versions 6.5.4 and 7.0. Prior versions may also be affected.

5) A boundary error exists in the HTML speed reader (htmsr.dll), which is used for viewing HTML attachments in emails. This can be exploited to cause a stack-based buffer overflow via a malicious email containing an overly long link beginning with either "http", "ftp", or "//".

Successful exploitation allows execution of arbitrary code with the privileges of the user running Lotus Notes, but requires that the user follows the link in the HTML document.

The vulnerability has been confirmed in versions 6.5.4 and 7.0. Prior versions may also be affected.

6) Another boundary error in the HTML speed reader when checking if a link references a local file can be exploited to cause a stack-based buffer overflow via a malicious email containing a specially crafted, overly long link.

Successful exploitation allows execution of arbitrary code with the privileges of the user running Lotus Notes, as soon as the user views the malicious HTML document.

The vulnerability has been confirmed in versions 6.5.4 and 7.0. Prior versions may also be affected.


Solution:
Update to version 6.5.5 or 7.0.1.

Provided and/or discovered by:
1-2) Tan Chew Keong, Secunia Research.
3) Tan Chew Keong and Carsten Eiram, Secunia Research.
4-6) Carsten Eiram, Secunia Research.

Original Advisory:
Secunia Research:
http://secunia.com/secunia_research/2005-30/
http://secunia.com/secunia_research/2005-32/
http://secunia.com/secunia_research/2005-34/
http://secunia.com/secunia_research/2005-36/
http://secunia.com/secunia_research/2005-37/

IBM:
http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918

Deep Links:
Links available to Secunia VIM customers

Do you have additional information related to this advisory?

Please provide information about patches, mitigating factors, new versions, exploits, faulty patches, links, and other relevant data by posting comments to this Advisory. You can also send this information to vuln@secunia.com

Subject: IBM Lotus Notes Multiple Vulnerabilities

No posts yet

-

You must be logged in to post a comment.



 Products Solutions Customers Partner Resources Company
 
 Corporate
Vulnerability Intelligence Manager (VIM)
Corporate Software Inspector (CSI)
Consumer
Personal Software Inspector (PSI)
Online Software Inspector (OSI)
 Industry
Compliance
Technology
Integration
 Customers
Testimonials
 VARS
MSSP
Technology Partners
References
 Factsheets
Reports
Webinars
Events
 About us
Careers
Memberships
Newsroom


 
© 2002-2014 Secunia ApS - Rued Langgaards Vej 8, 4th floor, DK-2300 Copenhagen, Denmark - +45 7020 5144
Terms & Conditions and Copyright - Privacy - Report Vulnerability