| VID |
22200 |
| Severity |
40 |
| Port |
80, ... |
| Protocol |
TCP |
| Class |
WWW |
| Detailed Description |
The Lotus Domino Web server, according to its version number, has a buffer overflow vulnerability in performing a redirect operation. This vulnerability can be exploited by a remote attacker to gain control of affected servers. When the server receives an overly long "Host:" header value, the server builds the 302 Redirect response and implants this value into the "Location" server header. It can cause a buffer overflow on the server and execute arbitrary code on the system with elevated privileges.
* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.
* References: http://www.nextgenss.com/advisories/lotus-hostlocbo.txt http://www.kb.cert.org/vuls/id/772817
* Platforms Affected: Lotus Domino 6.0 Release |
| Recommendation |
Upgrade to the latest version of Lotus Domino (6.0.1 or later), available from the IBM Web site: http://www14.software.ibm.com/webapp/download/search.jsp?q=&cat=&pf=&k=&dt=&go=y&rs=ESD-DMNTSRVRi&S_TACT=&S_CMP=&sb=r |
| Related URL |
CVE-2003-0178 (CVE) |
| Related URL |
6870 (SecurityFocus) |
| Related URL |
11337 (ISS) |
|