5151995 2000-06-01  07:58  /68 rader/ Postmaster
Mottagare: Bugtraq (import) <11072>
Ärende: Re: Lotus ESMTP Service (Lotus Domino Release 5.0.1 (Intl))
------------------------------------------------------------
Approved-By: aleph1@SECURITYFOCUS.COM
Delivered-To: bugtraq@lists.securityfocus.com
Delivered-To: BUGTRAQ@SECURITYFOCUS.COM
X-Sender: visi@unix49.andrew.cmu.edu
MIME-Version: 1.0
Content-Type: TEXT/PLAIN; charset=US-ASCII
Message-ID:  <Pine.LNX.3.96L.1000531101619.26720C-100000@unix49.andrew.cmu.edu>
Date:         Wed, 31 May 2000 10:39:58 -0400
Reply-To: Cory Visi <visi@CMU.EDU>
Sender: Bugtraq List <BUGTRAQ@SECURITYFOCUS.COM>
From: Cory Visi <visi@CMU.EDU>
X-To:         BUGTRAQ@SECURITYFOCUS.COM
To: BUGTRAQ@SECURITYFOCUS.COM
In-Reply-To:  <Pine.LNX.4.21.0005182111120.8955-100000@dione.ids.pl>

This bug has been fixed in Domino 5.04. This version of Domino is
not available yet (not even by QMR update).
Customers can request a hotfix if needed.

Here's a little info about Lotus and how they treat stuff like this.
As far as I can tell they don't have anyone reading BugTraq.  It has
been 7 business days since I reported the problem to Lotus Technical
Support and they have not gotten back to me.  In the event of future
problems, they told me to contact Lotus Technical Support (I assume
they mean by phone).

The information I reported regarding the bug came from Iris.

     .-.        ,~~-.      .-~~-.
 ~._'_.'        \_   \    /      `~~-
   |              `~- \  /
   `.__.-'ory          \/isi

On Thu, 18 May 2000, Michal Zalewski wrote:

-=(>Not much to say. While performing basic input validation checks
in Lotus
-=(>Domino ESMTP service (see subject) running on the top of Windows
NT system
-=(>(this applies probably to other platforms as well), within
approximately
-=(>30 seconds we found remote buffer overflow leading to system
crash (and,
-=(>if exploited, to remote system compromise). Sometimes I don't
believe this
-=(>is so simple! I could imagine that voluntary wu-ftpd developers
missed
-=(>some buffer-length checks while constructing process title - but
when I
-=(>look at such hole in product developed by major company employing
security
-=(>specialists, I ask my self is this intentional?:) Just kidding,
but with
-=(>whole respect - I believe anyone looking at the source code could
simply
-=(>SEE such buffer overflow - just like in Novell remote http
administration
-=(>bug I reported three weeks ago. Hey, but stop, I'm not going to
give
-=(>offence to these corporarions, sorry. Now, facts:
-=(>
-=(>220 *SNIP* Lotus Domino Release 5.0.1 (Intl) *SNIP*
-=(>HELO dood
-=(>250 *SNIP*
-=(>MAIL FROM: me@<four-kilobytes-of-junk>
-=(>(crash)
-=(>
-=(>
-=(>Btw. just to make it clear, I've got confirmation from Novell
about http
-=(>administration remote buffer overflow. Also, they said upgraded
modules
-=(>are available from their download area, and asked me to notify BQ
readers.
-=(>
-=(>Above statements are my own oppinions and observations
_only_. Standard
-=(>disclaimer applies.
-=(>
-=(>_______________________________________________________
-=(>Michal Zalewski [lcamtuf@tpi.pl] [tp.internet/security]
-=(>[http://lcamtuf.na.export.pl] <=--=> bash$ :(){ :|:&};:
-=(>=-----=> God is real, unless declared integer. <=-----=
-=(>
(5151995) ------------------------------------------(Ombruten)