{"vuid":"VU#959207","idnumber":"959207","name":"Lotus Notes Java VM leaks file existence through timing difference in ECLs","keywords":["lotus notes","timing window","information leakage","security"],"overview":"Lotus Notes JVM leaks information about the existence of a file.","clean_desc":"A malicious Java applet run in the Lotus Notes web browser can determine if a local file exists. Notes' preferences must be set to browse the web using the Notes browser, with execution of Java applets enabled. When a Java applet tries to access local files, Lotus Notes presents a dialog box to the user asking whether access should be allowed. It only presents this dialog after checking if the local file exists; if it does not exist, the dialog is not shown. Thus, if the applet can determine whether the dialog was shown, it will know whether the file exists. If the dialog is shown, it will take some time for the user to notice it and click a button to dismiss it. The applet can detect whether the dialog was shown by checking the times before and after trying to access the local file. If the dialog was not shown, the time difference will be very small, while if the dialog was shown, the time difference will be substantially longer. Based on the time difference, the applet can determine if the dialog was shown and therefore whether the local file exists.","impact":"By checking for the existence of certain files, an attacker can learn what software is installed and what programs have been executed recently on the client machine. However, the attacker cannot read or modify any files through this vulnerability.","resolution":"Lotus plans to fix this issue in a future release of Notes.","workarounds":"Disable execution of Java applets in Notes preferences. For more details, see http://www-1.ibm.com/support/docview.wss?uid=swg21102440.","sysaffected":"","thanks":"Thanks to Hiromitsu Takagi for reporting this vulnerability.","author":"This document was written by Shawn Van Ittersum.","public":["http://www.securityfocus.com/bid/1994","http://www-1.ibm.com/support/docview.wss?uid=swg21102440","http://java-house.jp/~takagi/java/security/lotus-notes-existence-attack/Test.html","http://java-house.jp/ml/archive/j-h-b/038904.html"],"cveids":["CVE-2000-1117"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2000-12-13T04:47:35Z","publicdate":"2000-11-28T00:00:00Z","datefirstpublished":"2001-05-14T19:57:06Z","dateupdated":"2006-03-30T15:44:45Z","revision":16,"vrda_d1_directreport":"","vrda_d1_population":"","vrda_d1_impact":"","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"1","cam_population":"1","cam_impact":"2","cam_easeofexploitation":"8","cam_attackeraccessrequired":"12","cam_scorecurrent":"0.0576","cam_scorecurrentwidelyknown":"0.0756","cam_scorecurrentwidelyknownexploited":"0.1476","ipprotocol":"","cvss_accessvector":"","cvss_accesscomplexity":"","cvss_authentication":null,"cvss_confidentialityimpact":"","cvss_integrityimpact":"","cvss_availabilityimpact":"","cvss_exploitablity":null,"cvss_remediationlevel":"","cvss_reportconfidence":"","cvss_collateraldamagepotential":"","cvss_targetdistribution":"","cvss_securityrequirementscr":"","cvss_securityrequirementsir":"","cvss_securityrequirementsar":"","cvss_basescore":"","cvss_basevector":"","cvss_temporalscore":"","cvss_environmentalscore":"","cvss_environmentalvector":"","metric":0.0576,"vulnote":null}