[SA16280] IBM Lotus Notes Multiple Vulnerabilities

2006-02-10T00:00:00
ID SECURITYVULNS:DOC:11371
Type securityvulns
Reporter Securityvulns
Modified 2006-02-10T00:00:00

Description

TITLE: IBM Lotus Notes Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA16280

VERIFY ADVISORY: http://secunia.com/advisories/16280/

CRITICAL: Highly critical

IMPACT: Security Bypass, System access

WHERE: >From remote

SOFTWARE: IBM Lotus Notes 6.x http://secunia.com/product/388/ IBM Lotus Notes 7.x http://secunia.com/product/7953/

DESCRIPTION: Secunia Research has discovered multiple vulnerabilities in Lotus Notes, which can be exploited by malicious people to bypass certain security restrictions or compromise a user's system.

1) A boundary error in kvarcve.dll when constructing the full pathname of a compressed file to check for its existence before extracting it from a ZIP archive can be exploited to cause a stack-based buffer overflow.

Successful exploitation allows execution of arbitrary code when the user extracts a compressed file with a long filename from within the Notes attachment viewer.

The vulnerability has been confirmed in version 6.5.4. Other versions may also be affected.

2) A boundary error in uudrdr.dll when handling UUE files containing an encoded file with an overly long filename can be exploited to cause a stack-based buffer overflow.

Successful exploitation allows execution of arbitrary code when a malicious UUE file is opened in the Notes attachment viewer.

The vulnerability has been confirmed in versions 6.5.4 and 7.0.

3) Directory traversal errors in kvarcve.dll when generating the preview of a compressed file from ZIP, UUE, and TAR archives can be exploited to delete arbitrary files that are accessible to the Notes user.

Successful exploitation requires that the user is e.g. tricked into previewing a compressed file with directory traversal sequences in its filename from within the Notes attachment viewer.

The vulnerability has been confirmed in versions 6.5.4 and 7.0. Prior versions may also be affected.

4) A boundary error in the TAR reader (tarrdr.dll) when extracting files from a TAR archive can be exploited to cause a stack-based buffer overflow via a TAR archive containing a file with a long filename.

Successful exploitation allows execution of arbitrary code, but requires that the user views a malicious TAR archive and chooses to extracts a compressed file to a directory with a very long path.

The vulnerability has been confirmed in versions 6.5.4 and 7.0. Prior versions may also be affected.

5) A boundary error exists in the HTML speed reader (htmsr.dll), which is used for viewing HTML attachments in emails. This can be exploited to cause a stack-based buffer overflow via a malicious email containing an overly long link beginning with either "http", "ftp", or "//".

Successful exploitation allows execution of arbitrary code with the privileges of the user running Lotus Notes, but requires that the user follows the link in the HTML document.

The vulnerability has been confirmed in versions 6.5.4 and 7.0. Prior versions may also be affected.

6) Another boundary error in the HTML speed reader when checking if a link references a local file can be exploited to cause a stack-based buffer overflow via a malicious email containing a specially crafted, overly long link.

Successful exploitation allows execution of arbitrary code with the privileges of the user running Lotus Notes, as soon as the user views the malicious HTML document.

The vulnerability has been confirmed in versions 6.5.4 and 7.0. Prior versions may also be affected.

SOLUTION: Update to version 6.5.5 or 7.0.1.

PROVIDED AND/OR DISCOVERED BY: 1-2) Tan Chew Keong, Secunia Research. 3) Tan Chew Keong and Carsten Eiram, Secunia Research. 4-6) Carsten Eiram, Secunia Research.

ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2005-30/ http://secunia.com/secunia_research/2005-32/ http://secunia.com/secunia_research/2005-34/ http://secunia.com/secunia_research/2005-36/ http://secunia.com/secunia_research/2005-37/

IBM: http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.