Advisory Details

April 6th, 2015

IBM Lotus Domino SSL2 Client Master Key Buffer Overflow Remote Code Execution Vulnerability

ZDI-15-116
ZDI-CAN-2684

CVE ID CVE-2015-0134
CVSS SCORE 10.0, AV:N/AC:L/Au:N/C:C/I:C/A:C
AFFECTED VENDORS IBM
AFFECTED PRODUCTS Lotus Domino
TREND MICRO CUSTOMER PROTECTION Trend Micro TippingPoint IPS customers are protected against this vulnerability by Digital Vaccine protection filter ID ['19421']. For further product information on the TippingPoint IPS: http://www.tippingpoint.com
VULNERABILITY DETAILS


This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of IBM Lotus Domino. Authentication is not required to exploit this vulnerability.

The flaw exists within the nldap.exe component which listens by default on TCP port 636. When handling Client Master Key Message packets, the process blindly copies attacker supplied data into an undersized buffer. A remote attacker could exploit this vulnerability to execute arbitrary code under the context of the SYSTEM user.

ADDITIONAL DETAILS IBM has issued an update to correct this vulnerability. More details can be found at:
http://www-01.ibm.com/support/docview.wss?uid=swg21700029
DISCLOSURE TIMELINE
  • 2015-01-27 - Vulnerability reported to vendor
  • 2015-04-06 - Coordinated public release of advisory
CREDIT Anonymous
BACK TO ADVISORIES