Lucene search

K
zdiIntevydis, http://intevydis.comZDI-11-053
HistoryFeb 07, 2011 - 12:00 a.m.

(0Day) Lotus Domino Server diiop getEnvironmentString Remote Code Execution Vulnerability

2011-02-0700:00:00
Intevydis, http://intevydis.com
www.zerodayinitiative.com
13

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.152 Low

EPSS

Percentile

95.8%

This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Domino. Authentication is not required to exploit this vulnerability. The flaw exists within the ndiiop.exe component which listens by default on a dynamic TCP port. When handling a GIOP getEnvironmentString request the process blindly copies user supplied argument into an stack buffer while checking the local variable cache. A remote attacker can exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

10 High

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:L/Au:N/C:C/I:C/A:C

0.152 Low

EPSS

Percentile

95.8%

Related for ZDI-11-053