Korean
<< Back
VID 18052
Severity 30
Port 25
Protocol TCP
Class SMTP
Detailed Description The version of the Lotus Domino SMTP server has a Mail Loop denial of service vulnerability.
The problem occurs when a message is received by the server with the mail recipient set as being at a domain that is not local to the server, and the sender as bounce@[127.0.0.1] like the following:

MAIL FROM: <bounce@[127.0.0.1]>
RCPT TO: <nosuchuser@invaild.net>

If this occurs, the server will attempt to bounce the messages and will enter into an infinite loop, which will cause the system to consume 100% of the CPU resources. In order to regain normal functionality from such an attack, the server must be restarted and the message must be manually removed from the queue.

* References:
http://archives.neohapsis.com/archives/bugtraq/2001-08/0280.html
http://www-1.ibm.com/support/docview.wss?uid=swg21100797

* Platforms Affected:
Lotus Domino 4.6.1 to 5.0.8
HP-UX Any version
Linux Any version
Solaris Any version
OS/2 Any version
Microsoft Windows Any version
Recommendation Upgrade to the Domino 5.0.9, or the latest version (6.0.1 or later) of Lotus Domino, available from Lotus's Download site at http://www-10.lotus.com/ldd/down.nsf

As a workaround, configure the server to drop messages from users originating from 127.0.0.1, as described in the Lotus Technote Reference # 1100797 (
http://www-1.ibm.com/support/docview.wss?uid=swg21100797 ).
Related URL CVE-2000-1203 (CVE)
Related URL 3212 (SecurityFocus)
Related URL 7012 (ISS)