Search This Blog

Thursday, October 25, 2007

[NEWS] IBM Lotus Notes Client TagAttributeListCopy Buffer Overflow Vulnerability

The following security advisory is sent to the securiteam mailing list, and can be found at the SecuriTeam web site: http://www.securiteam.com
- - promotion

The SecuriTeam alerts list - Free, Accurate, Independent.

Get your security news from a reliable source.
http://www.securiteam.com/mailinglist.html


- - - - - - - - -

IBM Lotus Notes Client TagAttributeListCopy Buffer Overflow Vulnerability
------------------------------------------------------------------------


SUMMARY

IBM Corp.'s
<http://www-142.ibm.com/software/sw-lotus/products/product4.nsf/wdocs/noteshomepage> Lotus Notes software is an integrated desktop client option for accessing e-mail, calendars and applications on an IBM Corp. Lotus Domino server.

Remote exploitation of a buffer overflow vulnerability in IBM Corp.'s
Lotus Notes mail user agent could allow attackers to execute arbitrary
code in the context of the current user.

DETAILS

Vulnerable Systems:
* IBM Corp.'s Lotus Notes version 7.0.2
* IBM Corp.'s Lotus Notes version 7.0.1
* IBM Corp.'s Lotus Notes version 6.5.1
* IBM Corp.'s Lotus Notes version 6.5.3
* (Other versions are suspected to be vulnerable.)

When a Lotus Notes user receives an HTML email, the HTML is converted to a
format resembling RTF (Rich Text Format). When messages are replied to,
forwarded or copied to the clipboard, the e-mail format is converted
again.

The buffer overflow is the result of a call to "Cstrcpy" when copying an
attacker supplied variable length string into a fixed-sized stack buffer.
The overflow occurs at the "Cstrcpy" call inside the
"TagAttributeListCopy" function in nnotes.dll.

Exploitation allows attackers to execute arbitrary code in the context of
the recipient of the message. In order to be successful, an attacker must
social engineer the victim into processing a specially crafted message in
a certain way. Specifically, the victim must either forward, reply with
history, or copy the message to the clipboard in order to trigger the
vulnerability.

Additionally, non-printable ASCII characters are converted to the LMBCS
(Lotus MultiByte Character Set) before the overflow occurs. This
complicates, but does not prevent, exploitation.

Vendor Status:
IBM Lotus has addressed this vulnerability within versions 7.0.3 and 8.0
of Lotus Notes. For more information, visit the following URL.
<http://www-1.ibm.com/support/docview.wss?rs=477&uid=swg21272930>

http://www-1.ibm.com/support/docview.wss?rs=477&uid=swg21272930

CVE Information:
<http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-4222>
CVE-2007-4222

Disclosure Timeline:
* 02/07/2007 - Initial vendor notification
* 02/07/2007 - Initial vendor response
* 10/23/2007 - Coordinated public disclosure


ADDITIONAL INFORMATION

The information has been provided by iDefense.
The original article can be found at:

<http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=604>

http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=604

========================================


This bulletin is sent to members of the SecuriTeam mailing list.
To unsubscribe from the list, send mail with an empty subject line and body to: list-unsubscribe@securiteam.com
In order to subscribe to the mailing list, simply forward this email to: list-subscribe@securiteam.com


====================
====================

DISCLAIMER:
The information in this bulletin is provided "AS IS" without warranty of any kind.
In no event shall we be liable for any damages whatsoever including direct, indirect, incidental, consequential, loss of business profits or special damages.

No comments: