{"vuid":"VU#411489","idnumber":"411489","name":"Lotus Domino Web Retriever contains a buffer overflow vulnerability","keywords":["Lotus Notes"],"overview":"A buffer overflow vulnerability may be exploited via the Lotus Domino Web Retriever. Versions prior to 5.0.12 and 6.0 are affected.","clean_desc":"According to the Rapid7 Advisory: The Lotus Notes/Domino Web Retriever task is responsible for retrieving web pages on behalf of Notes users who want to access the web via their Notes server. The Web Retriever program will crash when it receives an overly long HTTP status line from a remote web server. If the Web Retriever is running as a server task, the crash will cause a denial of service on the server. If the Web Retriever is running locally on a client, the crash will bring down the Notes client with it.","impact":"This vulnerability may be used to cause a denial of service.","resolution":"Lotus has published a support document for this issue. Upgrade to version 5.0.12 or 6.0 Gold or 6.0.1.","workarounds":"In their support document, Lotus recommends disabling the WEB task on the server as a workaround. This task is not enabled by default.","sysaffected":"","thanks":"Thanks to Rapid7, Inc. Security Advisories and Lotus for reporting this vulnerability.","author":"This document was written by Jason A Rafail based on information provided by Rapid7, Inc. and Lotus.","public":["http://www.rapid7.com/advisories/R7-0011.html","http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21105060"],"cveids":[""],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2003-03-07T14:46:56Z","publicdate":"2003-03-06T00:00:00Z","datefirstpublished":"2003-03-13T20:30:38Z","dateupdated":"2003-03-18T15:54:13Z","revision":17,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"10","cam_population":"15","cam_impact":"8","cam_easeofexploitation":"15","cam_attackeraccessrequired":"15","cam_scorecurrent":"12.65625","cam_scorecurrentwidelyknown":"15.1875","cam_scorecurrentwidelyknownexploited":"25.3125","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":12.65625,"vulnote":null}