|
|
|
|
| |
Credit:
The information has been provided by iDefense.
The original article can be found at:
http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=604
|
| |
Vulnerable Systems:
* IBM Corp.'s Lotus Notes version 7.0.2
* IBM Corp.'s Lotus Notes version 7.0.1
* IBM Corp.'s Lotus Notes version 6.5.1
* IBM Corp.'s Lotus Notes version 6.5.3
* (Other versions are suspected to be vulnerable.)
When a Lotus Notes user receives an HTML email, the HTML is converted to a format resembling RTF (Rich Text Format). When messages are replied to, forwarded or copied to the clipboard, the e-mail format is converted again.
The buffer overflow is the result of a call to "Cstrcpy" when copying an attacker supplied variable length string into a fixed-sized stack buffer. The overflow occurs at the "Cstrcpy" call inside the "TagAttributeListCopy" function in nnotes.dll.
Exploitation allows attackers to execute arbitrary code in the context of the recipient of the message. In order to be successful, an attacker must social engineer the victim into processing a specially crafted message in a certain way. Specifically, the victim must either forward, reply with history, or copy the message to the clipboard in order to trigger the vulnerability.
Additionally, non-printable ASCII characters are converted to the LMBCS (Lotus MultiByte Character Set) before the overflow occurs. This complicates, but does not prevent, exploitation.
Vendor Status:
IBM Lotus has addressed this vulnerability within versions 7.0.3 and 8.0 of Lotus Notes. For more information, visit the following URL.
http://www-1.ibm.com/support/docview.wss?rs=477&uid=swg21272930
CVE Information:
CVE-2007-4222
Disclosure Timeline:
* 02/07/2007 - Initial vendor notification
* 02/07/2007 - Initial vendor response
* 10/23/2007 - Coordinated public disclosure
|
|
|
|
|