Vulnerability Note VU#912420
The n.runs AG security advisory states:
Notes 8.5.3 does not filter <applet> tags inside HTML emails. This can be used to load arbitrary Java applets from remote sources (making it an information disclosure as well as this can be used to trigger an HTTP request once the mail is previewed/opened).
A remote unauthenticated attack may be able to execute arbitrary code in the context of the user viewing emails within IBM Notes.
Apply an Update
The following directives should be set to zero in notes.ini to reduce the attack surface.
Although not needed to mitigate this vulnerability, if plugins are not needed we recommend the following directive also be set to zero.
Alternatively, in Notes Basic Preferences, deselect the following three preferences:
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|IBM Corporation||Affected||19 Mar 2013||29 Apr 2013|
CVSS Metrics (Learn More)
Thanks to Alexander Klink for reporting this vulnerability.
This document was written by Jared Allar.
- CVE IDs: CVE-2013-0127 CVE-2013-0538
- Date Public: 30 Apr 2013
- Date First Published: 30 Apr 2013
- Date Last Updated: 03 May 2013
- Document Revision: 40
If you have feedback, comments, or additional information about this vulnerability, please send us email.