Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SMTP:MAL:LOTUS-MAILTO

Severity

High

Recommended

No

Category

SMTP

Keywords

IBM Lotus Domino nrouter.exe iCalendar MAILTO Stack Buffer Overflow

Release Date

2010/12/06

Update Number

1826

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SMTP: IBM Lotus Domino nrouter.exe iCalendar MAILTO Stack Buffer Overflow


This signature detects attempts to exploit a known stack buffer overflow vulnerability in IBM Lotus Domino Server. It is due an error in processing e-mail messages containing iCalendar requests. A remote unauthenticated attacker could leverage this by sending a malicious iCalendar e-mail message to a target server. A successful attack can lead to the execution of arbitrary code on a target server, within the security context of the affected service. In an unsuccessful attack, the target server can terminate abnormally.

Extended Description

IBM Lotus Domino is prone to a remote stack-based buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied input. Successfully exploiting this issue may allow remote attackers to execute arbitrary code in the context of the 'nrouter.exe' Lotus Domino server process. Failed attacks will cause denial-of-service conditions. Versions prior to IBM Lotus Domino 8.0.2 Fix Pack 5, 8.5.1 Fix Pack 2, and 8.5.2 are vulnerable.

Affected Products

  • IBM Lotus Domino 4.6.1
  • IBM Lotus Domino 4.6.3
  • IBM Lotus Domino 4.6.4
  • IBM Lotus Domino 5.0
  • IBM Lotus Domino 5.0.1
  • IBM Lotus Domino 5.0.10
  • IBM Lotus Domino 5.0.11
  • IBM Lotus Domino 5.0.13
  • IBM Lotus Domino 5.0.2
  • IBM Lotus Domino 5.0.3
  • IBM Lotus Domino 5.0.4
  • IBM Lotus Domino 5.0.4A
  • IBM Lotus Domino 5.0.5
  • IBM Lotus Domino 5.0.6
  • IBM Lotus Domino 5.0.6A
  • IBM Lotus Domino 5.0.7
  • IBM Lotus Domino 5.0.7A
  • IBM Lotus Domino 5.0.8
  • IBM Lotus Domino 5.0.8A
  • IBM Lotus Domino 5.0.9
  • IBM Lotus Domino 5.0.9A
  • IBM Lotus Domino 6.0.0
  • IBM Lotus Domino 6.0.1
  • IBM Lotus Domino 6.0.1.1
  • IBM Lotus Domino 6.0.1.2
  • IBM Lotus Domino 6.0.1.3
  • IBM Lotus Domino 6.0.2
  • IBM Lotus Domino 6.0.2.1
  • IBM Lotus Domino 6.0.2.2
  • IBM Lotus Domino 6.0.2 CF2
  • IBM Lotus Domino 6.0.3
  • IBM Lotus Domino 6.0.4
  • IBM Lotus Domino 6.0.5
  • IBM Lotus Domino 6.5
  • IBM Lotus Domino 6.5.0
  • IBM Lotus Domino 6.5.0 .0
  • IBM Lotus Domino 6.5.1
  • IBM Lotus Domino 6.5.2
  • IBM Lotus Domino 6.5.2.1
  • IBM Lotus Domino 6.5.3
  • IBM Lotus Domino 6.5.3.1
  • IBM Lotus Domino 6.5.4
  • IBM Lotus Domino 6.5.4.3
  • IBM Lotus Domino 6.5.4 FP 1
  • IBM Lotus Domino 6.5.4 FP 2
  • IBM Lotus Domino 6.5.5
  • IBM Lotus Domino 6.5.5 FP1
  • IBM Lotus Domino 6.5.5 FP2
  • IBM Lotus Domino 6.5.5 FP3
  • IBM Lotus Domino 6.5.6
  • IBM Lotus Domino 7.0.0
  • IBM Lotus Domino 7.0.1
  • IBM Lotus Domino 7.0.2
  • IBM Lotus Domino 7.0.2 FP1
  • IBM Lotus Domino 7.0.2 FP2
  • IBM Lotus Domino 7.0.2 FP3
  • IBM Lotus Domino 7.0.3
  • IBM Lotus Domino 7.0.3 Fix Pack 1 (FP1)
  • IBM Lotus Domino 7.0.4
  • IBM Lotus Domino 8.0
  • IBM Lotus Domino 8.0.1
  • IBM Lotus Domino 8.0.2
  • IBM Lotus Domino 8.5
  • IBM Lotus Domino 8.5 FP1

References

  • BugTraq: 43219
  • CVE: CVE-2010-3407

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out