Neohapsis is currently accepting applications for employment. For more information, please visit our website www.neohapsis.com or email email@example.com
Remote Buffer Overflow in Lotus Domino
From: Next Generation Insight Security Research (NGS Software) (markNGSSOFTWARE.COM)
Date: Tue Apr 12 2005 - 12:02:19 CDT
Mark Litchfield of NGSSoftware has discovered a high risk vulnerability in
Lotus Domino Server.
Versions affected include:
The flaw permits execution of arbitrary code via a maliciously crafted POST
request. Internal research
has discovered to date, 6 attack vectors.
This issue has been resolved in Lotus Domino as detailed at
It can be downloaded from:
NGSSoftware are going to withhold details of this flaw for three months.
will be published on the 12th of July 2005. This three month window will
allow users of
Lotus Domino the time needed to apply the patch before the details are
released to the general
public. This reflects NGSSoftware's approach to responsible disclosure.
NGSSoftware Insight Security Research
+44(0)208 401 0070
NTBugtraq Editor's Note:
Most viruses these days use spoofed email addresses. As such, using an Anti-Virus product which automatically notifies the perceived sender of a message it believes is infected may well cause more harm than good. Someone who did not actually send you a virus may receive the notification and scramble their support staff to find an infection which never existed in the first place. Suggest such notifications be disabled by whomever is responsible for your AV, or at least that the idea is considered.