Short Name |
SMTP:MAL:LOTUS-VIEWER |
---|---|
Severity |
High |
Recommended |
No |
Recommended Action |
Drop |
Category |
SMTP |
Keywords |
IBM Lotus Notes Lotus 1-2-3 Work Sheet File Viewer Buffer Overflow |
Release Date |
2010/10/20 |
Update Number |
1795 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-9.4+, srx-9.2+, srx-branch-9.4+, vsrx-12.1+ |
This signature detects attempts to exploit a known buffer overflow vulnerability in IBM Lotus Notes. It is due to a boundary error within the Lotus 1-2-3 file viewer. A remote attacker can leverage this by enticing a target user to view the maliciously crafted e-mail attachment. In a successful attack, code is injected and executed with the privileges of the currently logged on user. The behavior of the target host is entirely dependent on the intended function of the injected code; however the affected application would most likely stop functioning. In an unsuccessful attack, all instances of the IBM Lotus Notes application terminate.
Multiple stack-based buffer overflows in l123sr.dll in Autonomy (formerly Verity) KeyView SDK, as used by IBM Lotus Notes 5.x through 8.x, allow user-assisted remote attackers to execute arbitrary code via the (1) Length and (2) Value fields for certain Types in a Lotus 1-2-3 (.123) file in the Worksheet File (WKS) format, as demonstrated by a file with a crafted SRANGE record, a different vulnerability than CVE-2007-5909.