The IBM Lotus Domino Web Access ActiveX control contains multiple stack buffer overflow vulnerabilities, which may allow a remote, unauthenticated attacker to execute arbitrary code on a vulnerable system.
IBM Lotus Domino includes an ActiveX control called Domino Web Access, which is used for uploading files and clearing the cache on logout. The Domino Web Access is provided by the files inotes6.dll and inotes6w.dll for Domino 6.x, dwa7.dll or dwa7W.dll for Domino 7.x, and dwa8.dll or dwa8w.dll for Domino 8.x. The Domino Web Access ActiveX control contains multiple stack buffer overflows.
Exploit code for this vulnerability is publicly available.
By convincing a user to view a specially crafted HTML document (e.g., a web page or an HTML email message or attachment), an attacker may be able to execute arbitrary code with the privileges of the user. The attacker could also cause the web browser to crash.
Please see the IBM Advisory for details. This document indicates that Domino Web Access 8.0.1 and 7.0.4 will contain the fix, and also that a hot fix is available.
This vulnerability was reported by Will Dormann of the CERT/CC. It was also independently discovered and publicly disclosed by Elazar Broad.
This document was written by Will Dormann.
|Date First Published:||2007-12-21|
|Date Last Updated:||2009-04-13 17:16 UTC|