| VID |
18052 |
| Severity |
30 |
| Port |
25 |
| Protocol |
TCP |
| Class |
SMTP |
| Detailed Description |
The version of the Lotus Domino SMTP server has a Mail Loop denial of service vulnerability. The problem occurs when a message is received by the server with the mail recipient set as being at a domain that is not local to the server, and the sender as bounce@[127.0.0.1] like the following:
MAIL FROM: <bounce@[127.0.0.1]> RCPT TO: <nosuchuser@invaild.net>
If this occurs, the server will attempt to bounce the messages and will enter into an infinite loop, which will cause the system to consume 100% of the CPU resources. In order to regain normal functionality from such an attack, the server must be restarted and the message must be manually removed from the queue.
* References: http://archives.neohapsis.com/archives/bugtraq/2001-08/0280.html http://www-1.ibm.com/support/docview.wss?uid=swg21100797
* Platforms Affected: Lotus Domino 4.6.1 to 5.0.8 HP-UX Any version Linux Any version Solaris Any version OS/2 Any version Microsoft Windows Any version |
| Recommendation |
Upgrade to the Domino 5.0.9, or the latest version (6.0.1 or later) of Lotus Domino, available from Lotus's Download site at http://www-10.lotus.com/ldd/down.nsf
As a workaround, configure the server to drop messages from users originating from 127.0.0.1, as described in the Lotus Technote Reference # 1100797 ( http://www-1.ibm.com/support/docview.wss?uid=swg21100797 ). |
| Related URL |
CVE-2000-1203 (CVE) |
| Related URL |
3212 (SecurityFocus) |
| Related URL |
7012 (ISS) |
|