Summary
The host is running IBM Lotus Domino Server and is prone to remote buffer overflow vulnerabilities.
Impact
Successful exploitation may allow remote attackers to execute arbitrary code in the context of the Lotus Domino server process.
Impact Level: Application/System
Solution
Upgrade to IBM Lotus Domino version 8.5.3 or later For updates refer to http://www-01.ibm.com/software/lotus/products/domino/
Insight
The multiple flaws are due to,
- Error in 'ndiiop.exe' in the DIIOP implementation, which allows remote attackers to execute arbitrary code via a GIOP getEnvironmentString request.
- Integer signedness error in 'ndiiop.exe' in the DIIOP implementation, which allows remote attackers to execute arbitrary code via a GIOP client request.
- Error in 'nrouter.exe', which allows remote attackers to execute arbitrary code via a long name parameter in a Content-Type header in a malformed Notes calendar meeting request.
Affected
IBM Lotus Domino versions prior to 8.5.3
References
Severity
Classification
-
CVE CVE-2011-0913, CVE-2011-0914, CVE-2011-0915 -
CVSS Base Score: 10.0
AV:N/AC:L/Au:N/C:C/I:C/A:C
Related Vulnerabilities
- Adobe Reader 'XFDF' File Buffer Overflow Vulnerability (Mac OS X)
- ALZip MIM File Processing Buffer Overflow Vulnerability
- Active Perl 'Perl_repeatcpy()' Function Buffer Overflow Vulnerability (Windows)
- CTorrent/Enhanced CTorrent Buffer Overflow Vulnerability
- Advantech Studio Multiple Buffer Overflow Vulnerabilities