Short Name |
HTTP:DOMINO:POST-DOS2 |
---|---|
Severity |
Minor |
Recommended |
No |
Category |
HTTP |
Keywords |
Lotus Domino Post DoS (2) |
Release Date |
2005/06/20 |
Update Number |
1213 |
Supported Platforms |
idp-4.0+, isg-3.0+, j-series-9.5+, mx-11.4+, srx-12.1+, srx-branch-12.1+, vmx-17.4+, vsrx-12.1+, vsrx3bsd-18.2+ |
This signature detects attempts to exploit a known vulnerability against Lotus Domino. Attackers can use malformed variables within a Post statement to cause a denial-of-service (DoS) condition.
Lotus Domino Server is reported prone to a remote buffer overflow vulnerability. The issue presents itself when the server handles a malformed HTTP POST request. A successful attack may result in a denial of service condition, however, arbitrary code execution may occur as well. This issue may be leveraged to gain unauthorized access to a server. IBM Lotus Domino Server versions 6.5.x and 6.0.x are reported vulnerable. The researcher responsible for discovering this issue has reported that this vulnerability affects versions 6.0.5 and 6.5.4. IBM Lotus Domino Server versions 6.0.5 and 6.5.4 were recently released, therefore it is likely that they are not affected and this issue only manifests in the versions prior to these. IBM also recommends that users should upgrade to these versions. Please see the referenced IBM advisory for more information. This BID will be updated when more details are available.