search menu icon-carat-right cmu-wordmark

CERT Coordination Center

Lotus iNotes vulnerable to buffer overflow via PresetFields s_ViewName field

Vulnerability Note VU#542873

Original Release Date: 2003-02-19 | Last Revised: 2003-03-26


Lotus iNotes contains a buffer overflow that could permit a remote attacker to execute arbitrary code or cause a denial of service on a vulnerable server.


Lotus iNotes Web Access is a web-based database application that provides "access to corporate messaging services and personal information through a Web browser." NGSSoftware has researched and reported a buffer overflow vulnerability in iNotes that can be triggered via a specially crafted s_ViewName value of the PresetFields parameter. For further information, see NGSSoftware Insight Security Research Advisory #NISR17022003b.

Lotus is tracking this issue as SPR# KSPR5HUPEK. Further information is available in IBM Technote 1104542.


A remote attacker could execute arbitrary code with the privileges of the Domino server process or cause a denial of service.


This issue is resolved in Notes/Domino 6.0.1 and 5.0.12.

Disable Vulnerable Service

Until upgrades can be performed, consider disabling iNotes.

Vendor Information

Affected   Unknown   Unaffected

Lotus Software

Notified:  January 17, 2003 Updated:  March 17, 2003



Vendor Statement

iNotes buffer overrun
Status 5.x: Fixed in 5.0.12
Status 6.x: Fixed in 6.0.1
Document #: 1104542

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.


The CERT/CC has no additional comments at this time.

If you have feedback, comments, or additional information about this vulnerability, please send us email.

CVSS Metrics

Group Score Vector
Base N/A N/A
Temporal N/A N/A
Environmental N/A



This vulnerability was reported by Mark Litchfield of NGSSoftware

This document was written by Art Manion.

Other Information

CVE IDs: None
CERT Advisory: CA-2003-11
Severity Metric: 18.51
Date Public: 2003-02-17
Date First Published: 2003-02-19
Date Last Updated: 2003-03-26 17:44 UTC
Document Revision: 27

Sponsored by the Department of Homeland Security Office of Cybersecurity and Communications.