Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

POP3:OVERFLOW:HTTP-LINK-OF

Severity

High

Recommended

No

Recommended Action

Drop

Category

POP3

Keywords

HTTP Link Overflow

Release Date

2010/09/22

Update Number

1777

Supported Platforms

idp-4.0+, isg-3.4+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

POP3: HTTP Link Overflow


This signature detects attempts to exploit a known vulnerability in multiple mail clients. A successful attack can lead to a buffer overflow and arbitrary remote code execution within the context of the user.

Extended Description

IBM Lotus Notes is prone to multiple remote vulnerabilities. The buffer-overflow issues could allow arbitrary code execution in the context of the user running the application. The issues are: - A buffer overflow exists when extracting files from ZIP archives. - A buffer overflow exists when extracting files from UUE encoded files. - A buffer overflow exists when extracting files from TAR archives. - A buffer overflow exists when handling HTML file attachments with malicious links. - A directory traversal exists when generating previews of ZIP, UUE, and TAR archives. This could be exploited to overwrite arbitrary files in the context of the current user. Lotus Notes 6.5.4 and 7.0 are prone to these issues. Other versions may also be vulnerable.

Affected Products

  • IBM Lotus Notes 6.0.1
  • IBM Lotus Notes 6.0.2
  • IBM Lotus Notes 6.0.3
  • IBM Lotus Notes 6.0.4
  • IBM Lotus Notes 6.0.5
  • IBM Lotus Notes 6.5.0
  • IBM Lotus Notes 6.5.1
  • IBM Lotus Notes 6.5.2
  • IBM Lotus Notes 6.5.3
  • IBM Lotus Notes 6.5.4
  • IBM Lotus Notes 7.0

References

  • BugTraq: 16576
  • CVE: CVE-2005-2618

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out