Korean
<< Back
VID 22149
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The Lotus Domino web server, according to its version number, is vulnerable to a buffer overflow attack.
When logging to DOMLOG.NSF is enabled on the server, a remote user can send a long HTTP Authenticate header containing certain non-ASCII characters to cause the web server to crash. It is possible for remote attackers to corrupt sensitive regions of memory which attacker-supplied values, possibly resulting in execution of arbitrary code with the privileges of the Lotus Domino web server.

* Note: This check solely relied on the banner of the remote web server to assess this vulnerability, so this might be a false positive.

* Platforms Affected:
Lotus Domino 5.0.9 and earlier
Recommendation Upgrade to Lotus Domino 5.0.10 or later, available from http://www.notes.net/qmrdown.nsf

As a temporary workaround, it has been suggested that users can log to a textfile instead of to the 'DOMLOG.NSF' database.
Related URL CVE-2002-2025 (CVE)
Related URL 2575,4019,4020 (SecurityFocus)
Related URL 6348 (ISS)