CERTA-2001-AVI-166
Vulnerability from certfr_avis - Published: - Updated:None
Description
Un utilisateur mal intentionné peut, par le biais d'une URL HTTPS (port 443/TCP) habilement conçue, effectuer un débordement de mémoire du serveur web Domino si SSL est activé.
Ce débordement de mémoire a pour conséquence de bloquer l'accès au serveur. Il faut redémarrer le service nHTTP.
Contournement provisoire
Le port 443/TCP doit être bloqué par les gardes-barrières afin d'éviter d'être attaqué depuis l'extérieur.
Solution
Passer à la version 5.0.9 de Lotus Domino ou appliquer le correctif SPR# MALR4Y6RL8.
http://www.notes.net
Serveurs web Lotus Domino dont la version est inférieure à 5.0.9 avec SSL activé.
Impacted products
| Vendor | Product | Description |
|---|
References
| Title | Publication Time | Tags | |||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|
|
|||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cP\u003eServeurs web Lotus Domino dont la version est inf\u00e9rieure \u00e0 5.0.9 avec SSL activ\u00e9.\u003c/P\u003e",
"content": "## Description\n\nUn utilisateur mal intentionn\u00e9 peut, par le biais d\u0027une URL HTTPS (port\n443/TCP) habilement con\u00e7ue, effectuer un d\u00e9bordement de m\u00e9moire du\nserveur web Domino si SSL est activ\u00e9.\n\nCe d\u00e9bordement de m\u00e9moire a pour cons\u00e9quence de bloquer l\u0027acc\u00e8s au\nserveur. Il faut red\u00e9marrer le service nHTTP.\n\n## Contournement provisoire\n\nLe port 443/TCP doit \u00eatre bloqu\u00e9 par les gardes-barri\u00e8res afin d\u0027\u00e9viter\nd\u0027\u00eatre attaqu\u00e9 depuis l\u0027ext\u00e9rieur.\n\n## Solution\n\nPasser \u00e0 la version 5.0.9 de Lotus Domino ou appliquer le correctif SPR#\nMALR4Y6RL8.\n\n http://www.notes.net\n",
"cves": [],
"links": [
{
"title": "La note technique de Lotus :",
"url": "http://support.lotus.com/sims2.nsf/4c8e450dbf2e7f1885256b200079fa88"
}
],
"reference": "CERTA-2001-AVI-166",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2001-12-24T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service"
}
],
"summary": null,
"title": "Vuln\u00e9rabilit\u00e9 du serveur web de Lotus Domino associ\u00e9 \u00e0 SSL",
"vendor_advisories": [
{
"published_at": null,
"title": "bulletin de s\u00e9curit\u00e9 Lotus 190143",
"url": null
},
{
"published_at": null,
"title": "bulletin de correctif MALR4Y6RL8",
"url": null
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…