Vulnerabilities > CVE-2005-1101 - Unspecified vulnerability in IBM Lotus Domino Server 6.0.5/6.5.4

047910
CVSS 7.5 - HIGH
Attack vector
NETWORK
Attack complexity
LOW
Privileges required
NONE
Confidentiality impact
PARTIAL
Integrity impact
PARTIAL
Availability impact
PARTIAL
network
low complexity
ibm
nessus

Summary

Multiple buffer overflows in Lotus Domino Server 6.0.5 and 6.5.4 allow remote attackers to cause a denial of service (application crash) and possibly execute arbitrary code via large amounts of data in certain (1) time or (2) date fields.

Vulnerable Configurations

Part Description Count
Application
Ibm
2

Nessus

NASL familyCGI abuses
NASL idDOMINO_HTTP_POST_DATE_OVERFLOW.NASL
descriptionAccording to its banner, the remote host is running a version of Lotus Domino Server that is prone to a buffer overflow attack triggered by submitting a POST request with large amounts of data for certain date / time fields. A remote attacker can reportedly exploit this issue to crash the web server or possible execute arbitrary code on the affected host.
last seen2020-06-01
modified2020-06-02
plugin id19238
published2005-07-20
reporterThis script is Copyright (C) 2005-2018 Tenable Network Security, Inc.
sourcehttps://www.tenable.com/plugins/nessus/19238
titleIBM Lotus Domino Server time/date Fields Remote Overflow
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(19238);
  script_version("1.18");
  script_cvs_date("Date: 2018/11/15 20:50:16");

  script_cve_id("CVE-2005-1101");
  script_bugtraq_id(13130);

  script_name(english:"IBM Lotus Domino Server time/date Fields Remote Overflow");
  script_summary(english:"Checks for date fields overflow vulnerability in Lotus Domino Server");
 
  script_set_attribute(attribute:"synopsis", value:
"The remote web server is susceptible to a buffer overflow
vulnerability attack.");
  script_set_attribute(attribute:"description", value:
"According to its banner, the remote host is running a version of Lotus
Domino Server that is prone to a buffer overflow attack triggered by
submitting a POST request with large amounts of data for certain date
/ time fields.  A remote attacker can reportedly exploit this issue to
crash the web server or possible execute arbitrary code on the
affected host.");
  script_set_attribute(attribute:"see_also", value:"http://www.ngssoftware.com/advisories/lotus-01.txt");
  script_set_attribute(attribute:"see_also", value:"https://seclists.org/bugtraq/2005/Apr/159");
  script_set_attribute(attribute:"see_also", value:"http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21202431");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Lotus Domino Server version 6.0.5 / 6.5.4 Maintenance
Release or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:U/RC:C");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"plugin_publication_date", value:"2005/07/20");
  script_set_attribute(attribute:"vuln_publication_date", value:"2005/04/05");
  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:lotus_domino");
  script_end_attributes();
 
  script_category(ACT_GATHER_INFO);
  script_family(english:"CGI abuses");
  script_copyright(english:"This script is Copyright (C) 2005-2018 Tenable Network Security, Inc.");
  script_dependencies("http_version.nasl");
  script_require_ports("Services/www", 80);
  exit(0);
}

include("global_settings.inc");
include("misc_func.inc");
include("http.inc");

port = get_http_port(default:80);
banner = get_http_banner(port:port);
if (!banner || "Lotus Domino" >!< banner) exit(0);


# Check the version number.
#
# nb: Litchfield claims 6.0.5 and 6.5.4 are affected, and earlier versions
#     may also be. Also note that there are no versions 6.1.x - 6.4.x per 
#     the Fix List at 
#     <http://www-10.lotus.com/ldd/r5fixlist.nsf/Public?OpenView>.
if (egrep(string:banner, pattern:"^Server: +Lotus-Domino/([0-5]\.|6\.(0\.[0-5]|5\.[0-4]))"))
  security_hole(port);