Security Bulletin: IBM Lotus Notes URL Command Injection Remote Code Execution Vulnerability (CVE-2012-2174)
A security vulnerability exists in the IBM Lotus Notes URL handler which permits remote code execution. Malicious URLs could allow remote attackers to execute arbitrary code on installations of Lotus Notes (Standard clients only). Note: Domino servers and Notes Basic clients are not impacted.
CVE ID: CVE-2012-2174
DESCRIPTION: A security vulnerability exists in the IBM Lotus Notes URL handler which permits remote code execution. Malicious URLs could allow remote attackers to execute arbitrary code on installations of Lotus Notes (Standard clients only). To exploit this vulnerability, the remote attacker must convince a Notes user running on Windows to click on a malicious URL.
As of 15-Jun-2012, IBM has not received any reports of customer issues related to this security vulnerability.
Using the Common Vulnerability Scoring System (CVSS) v2, the security ratings for these issues are:
CVSS Base Score: 9.3
CVSS Temporal Score: See https://exchange.xforce.ibmcloud.com/vulnerabilities/75320 for the current score.
CVSS Environmental Score: Undefined
CVSS String: (AV:N/AC:M/Au:N/C:C/I:C/A:C)
Lotus Notes 8.0.2, 8.5, 8.5.1, 8.5.2, 8.5.3
This issue is being tracked by Quality Engineering as SPR# SRAO8U3FUU. A fix for the issue will be introduced in Notes 8.5.3 Fix Pack 2 and Interim Fix 1 for Notes 8.5.2 Fix Pack 4. See the following technotes for download links to the latest Fix Pack and Interim Fix for Notes. (Note: This issue and fix pertains only to Notes Standard clients; Domino servers and Notes Basic clients are not impacted.)
· IBM Secure Engineering Web Portal
· IBM Product Security Incident Response Blog
This vulnerability was discovered by Moritz Jodeit and reported to IBM through the HP TippingPoint Zero Day Initiative.
|26 July 2012||Updates to clarify issue & fix pertain to Notes Standard clients only.|
|26 June 2012||Added download links to fixes|
|15 June 2012||Initial Publication|
*The CVSS Environment Score is customer environment specific and will ultimately impact the Overall CVSS Score. Customers can evaluate the impact of this vulnerability in their environments by accessing the links in the Reference section of this Flash.
Note: According to the Forum of Incident Response and Security Teams (FIRST), the Common Vulnerability Scoring System (CVSS) is an "industry open standard designed to convey vulnerability severity and help to determine urgency and priority of response." IBM PROVIDES THE CVSS SCORES "AS IS" WITHOUT WARRANTY OF ANY KIND, INCLUDING THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR PURPOSE. CUSTOMERS ARE RESPONSIBLE FOR ASSESSING THE IMPACT OF ANY ACTUAL OR POTENTIAL SECURITY VULNERABILITY.
Translate this page: