CERTA-2001-AVI-166

Vulnerability from certfr_avis - Published: - Updated:

None

Description

Un utilisateur mal intentionné peut, par le biais d'une URL HTTPS (port 443/TCP) habilement conçue, effectuer un débordement de mémoire du serveur web Domino si SSL est activé.

Ce débordement de mémoire a pour conséquence de bloquer l'accès au serveur. Il faut redémarrer le service nHTTP.

Contournement provisoire

Le port 443/TCP doit être bloqué par les gardes-barrières afin d'éviter d'être attaqué depuis l'extérieur.

Solution

Passer à la version 5.0.9 de Lotus Domino ou appliquer le correctif SPR# MALR4Y6RL8.

http://www.notes.net

Serveurs web Lotus Domino dont la version est inférieure à 5.0.9 avec SSL activé.

Impacted products
Vendor Product Description
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [],
  "affected_systems_content": "\u003cP\u003eServeurs web Lotus Domino dont la version est inf\u00e9rieure \u00e0  5.0.9 avec SSL activ\u00e9.\u003c/P\u003e",
  "content": "## Description\n\nUn utilisateur mal intentionn\u00e9 peut, par le biais d\u0027une URL HTTPS (port\n443/TCP) habilement con\u00e7ue, effectuer un d\u00e9bordement de m\u00e9moire du\nserveur web Domino si SSL est activ\u00e9.\n\nCe d\u00e9bordement de m\u00e9moire a pour cons\u00e9quence de bloquer l\u0027acc\u00e8s au\nserveur. Il faut red\u00e9marrer le service nHTTP.\n\n## Contournement provisoire\n\nLe port 443/TCP doit \u00eatre bloqu\u00e9 par les gardes-barri\u00e8res afin d\u0027\u00e9viter\nd\u0027\u00eatre attaqu\u00e9 depuis l\u0027ext\u00e9rieur.\n\n## Solution\n\nPasser \u00e0 la version 5.0.9 de Lotus Domino ou appliquer le correctif SPR#\nMALR4Y6RL8.\n\n    http://www.notes.net\n",
  "cves": [],
  "links": [
    {
      "title": "La note technique de Lotus :",
      "url": "http://support.lotus.com/sims2.nsf/4c8e450dbf2e7f1885256b200079fa88"
    }
  ],
  "reference": "CERTA-2001-AVI-166",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2001-12-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service"
    }
  ],
  "summary": null,
  "title": "Vuln\u00e9rabilit\u00e9 du serveur web de Lotus Domino associ\u00e9 \u00e0 SSL",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "bulletin de s\u00e9curit\u00e9 Lotus 190143",
      "url": null
    },
    {
      "published_at": null,
      "title": "bulletin de correctif MALR4Y6RL8",
      "url": null
    }
  ]
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or observed by the user.
  • Confirmed: The vulnerability has been validated from an analyst's perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
  • Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
  • Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
  • Not confirmed: The user expressed doubt about the validity of the vulnerability.
  • Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.


Loading…

Detection rules are retrieved from Rulezet.

Loading…

Loading…