Lotus Software Affected

Notified:  January 15, 2003 Updated: March 17, 2003

Status

Affected

Vendor Statement

NGSS Advisory Title: Lotus Domino Denial of Service Attacks NGSS reference: NISR17022003d http://www.nextgenss.com/advisories/lotus-60dos.txt SPR#KSPR5HTQHS Status 5.x: Fixed in 5.0.12 Status 6.0: Fixed in 6.0.1 Document #: 1104528 Technote: http://www.ibm.com/support/docview.wss?rs=463&uid=swg21104528 CERT Reference: VU#355169

Vendor Information

The vendor has not provided us with any further information regarding this vulnerability.

Addendum

Lotus Domino Denial of Service Attacks; reported by NGSS  Technote Problem Certain incomplete or overly long POST requests can cause the HTTP server task to fail. This vulnerability can be exploited by a malicious user to bring down the Web server task. The server does not crash, but the HTTP task needs to be restarted. Solution This issue was reported to Lotus Software Quality Engineering and has been addressed in Domino 5.0.12 and Domino 6.0.1. Customers running 5.0x servers should upgrade to 5.0.12 or later to resolve the problem. Customers running 6.0 servers should upgrade to 6.0.1 or later to resolve the problem. Excerpt from the Lotus Notes and Lotus Domino Release 5.0.12 and 6.0.1 Fix List (available from http://www.lotus.com/ldd): SPR# KSPR5HTQHS - Fixed a potential Denial of Service Attack. Related URLs: NGSS Advisory # NISR17022003d: http://www.nextgenss.com/advisories/lotus-60dos.txt CERT VU# 355169: http://www.kb.cert.org/vuls