{"vuid":"VU#666872","idnumber":"666872","name":"Buffer Overflow in Lotus Domino Mail Server","keywords":["Lotus","Domino","mail","smtp","policy","domain","security","buffer overflow","notes"],"overview":"Lotus Domino R5 SMTP Server Contains a Buffer Overflow","clean_desc":"The Lotus Domino R5 SMTP server allows an administrator to restrict the domains from which the server will accept mail. In versions of Domino R5 prior to version 5.0.6 with domain restrictions enabled an intruder may be able to  overflow a buffer and execute code or disrupt the ordinary operation of the server. Servers without domain restrictions are not affaected, nor are versions  4.x and earlier. Additional detail can be found in a Lotus Customer Support Technote.","impact":"Intruders can execute code with the privileges of the process running the SMTP server.","resolution":"Upgrade to Domino version 5.0.6.","workarounds":"Removing domain restrictions will eliminate this vulnerability, but may not be consistent with other security policies at your site.","sysaffected":"","thanks":"This issue was originally discovered and reported by Security Research Team, who published their finding as \nSAFER Security Bulletin \n010123.EXP.1.10","author":"This document was written by Shawn V. Hernan","public":["http://www.securityfocus.com/bid/2283","http://www.safermag.com/advisories/0012.html","http://www.notes.net/R5FixList.nsf/5c087391999d06e7852569280062619d/0b8b42b317c59e38852569e00078e62b?OpenDocument&Highlight=0,CMAS4NNLVG","http://support.lotus.com/sims2.nsf/eb5fbc0ab175cf0885256560005206cf/a05d4ad614858e0a852569e6005f1fc5?OpenDocument&Highlight=0,184329"],"cveids":["CVE-2001-0260"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2001-01-24T23:51:08Z","publicdate":"2001-01-23T00:00:00Z","datefirstpublished":"2001-02-08T02:45:14Z","dateupdated":"2001-02-08T03:16:04Z","revision":7,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"17","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"6","cam_impact":"18","cam_easeofexploitation":"15","cam_attackeraccessrequired":"20","cam_scorecurrent":"13.365","cam_scorecurrentwidelyknown":"15.1875","cam_scorecurrentwidelyknownexploited":"27.3375","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":13.365,"vulnote":null}