Vulnerability Note VU#884076
IBM Lotus Notes ZIP file handling buffer overflow
IBM Lotus Notes contains a buffer overflow when handling a ZIP file with a large file name. This could allow a remote attacker to execute arbitrary code on a vulnerable system.
IBM Lotus Notes is an integrated client application that provides functionality including email, calendar, instant messaging, and collaboration. Notes has the ability to extract ZIP archive files. The method for extracting ZIP files contains a buffer overflow vulnerability. The vulnerable code is executed when a user clicks the View option after selecting a ZIP file.
By convincing a user to view a specially crafted ZIP file, a remote attacker may be able to execute arbitrary code on a vulnerable system.
IBM has released Notes 6.5.5 and Notes 7.0.1 to address this vulnerability.
There are three options for disabling these viewers:
1. Action: Delete the keyview.ini file in the Notes program directory.
Results: When a user clicks View (for any file), a dialog box will be displayed with the message "Unable to locate the viewer configuration file."
2. Action: Delete the problem files (ziprdr.dll, uudrdr.dll, htmsr.dll, tarrdr.dll).
Result: When a user tries to view the specific file types (html pages, zip/tar/uud archives), a dialog box will be displayed with the message "The viewer display window could not be initialized." All other file types work without returning the error message.
3. Action: Comment out specific lines in keyview.ini (by preceding the line with an asterisk * ) for any references to the problem files (dlls). For example:
Result: When a user tries to view the specific file types (html files, tar/uud archives), a dialog box will be displayed with the message "The viewer display window could not be initialized."
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|IBM Corporation||Affected||-||15 Feb 2006|
CVSS Metrics (Learn More)
This vulnerability was disclosed by IBM, who in turn credit Secunia with reporting the vulnerability.
This document was written by Will Dormann.
- CVE IDs: CVE-2005-2618
- Date Public: 10 Feb 2006
- Date First Published: 15 Feb 2006
- Date Last Updated: 15 Feb 2006
- Severity Metric: 6.69
- Document Revision: 4
If you have feedback, comments, or additional information about this vulnerability, please send us email.