Juniper Networks
Solutions
Products & Services
Company
Partners
Support
Education

Signature Detail

Security Intelligence Center
Signatures
Print

Short Name

SMTP:MAL:LOTUS-VIEWER

Severity

High

Recommended

No

Recommended Action

Drop

Category

SMTP

Keywords

IBM Lotus Notes Lotus 1-2-3 Work Sheet File Viewer Buffer Overflow

Release Date

2010/10/20

Update Number

1795

Supported Platforms

idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+

SMTP: IBM Lotus Notes Lotus 1-2-3 Work Sheet File Viewer Buffer Overflow


This signature detects attempts to exploit a known buffer overflow vulnerability in IBM Lotus Notes. It is due to a boundary error within the Lotus 1-2-3 file viewer. A remote attacker can leverage this by enticing a target user to view the maliciously crafted e-mail attachment. In a successful attack, code is injected and executed with the privileges of the currently logged on user. The behavior of the target host is entirely dependent on the intended function of the injected code; however the affected application would most likely stop functioning. In an unsuccessful attack, all instances of the IBM Lotus Notes application terminate.

Extended Description

Multiple stack-based buffer overflows in l123sr.dll in Autonomy (formerly Verity) KeyView SDK, as used by IBM Lotus Notes 5.x through 8.x, allow user-assisted remote attackers to execute arbitrary code via the (1) Length and (2) Value fields for certain Types in a Lotus 1-2-3 (.123) file in the Worksheet File (WKS) format, as demonstrated by a file with a crafted SRANGE record, a different vulnerability than CVE-2007-5909.

Affected Products

  • ibm lotus_notes 5.0
  • ibm lotus_notes 6.0
  • ibm lotus_notes 6.5
  • ibm lotus_notes 7.0
  • ibm lotus_notes 8.0

References

  • CVE: CVE-2007-6593

Site Map
RSS Feeds
Careers
Accessibility
Feedback
Privacy Policy
Legal Notices
Copyright © 1999-2010 Juniper Networks, Inc. All rights reserved.
Help
|
My Account
|
Log Out