[prev in list] [next in list] [prev in thread] [next in thread] 

List:       full-disclosure
Subject:    Re: [Full-disclosure] [FG-VD-11-007]IBM Lotus Notes/Domino Server
From:       Jim Elkins <jime () tctc ! com>
Date:       2011-12-31 17:52:24
Message-ID: 23B6B4DF-0954-43A1-A237-2ABA3809BBFC () tctc ! com
[Download RAW message or body]



Jim Elkins, Integration Engineer
Vote By Mail Solutions
Runbeck Election Services
765.404.3222
www.Runbeck.net

On Dec 30, 2011, at 8:40 PM, \
"noreply-secresearch@fortinet.com"<noreply-secresearch@fortinet.com> wrote:

[FG-VD-11-007]IBM Lotus Notes/Domino Server Remote Denial of Service Vulnerability
2011.December.30

Summary:

Fortinet's FortiGuard Labs has discovered a Remote Denial of Service Vulnerability in IBM Lotus \
Notes/Domino Server.

Impact:

Remote Denial of Service

Risk:

High (CVSS Base Score:7.8) 

Affected Software:

IBM Lotus Domino Server
   8.5.2 FP3 and earlier
   8.5.1
   8.5
   8.0.x

Additional Information:

The vulnerability occurs while IBM Lotus Notes/Domino Server handles malformed TCP packet. \
Successful exploitation could cause the server 

crash instantly. 

Solutions:
==========

Use the solution provided by IBM: http://www-01.ibm.com/support/docview.wss?uid=swg21575247

Fortinet customers who subscribe to Fortinet's intrusion prevention (IPS) service should be \
protected against this Remote Denial Of Service  vulnerability. Fortinet's IPS service is one \
component of FortiGuard Subscription Services, which also offer comprehensive solutions such 

as antivirus, Web content filtering and antispam capabilities. These services enable protection \
against threats on both application and 

network layers. FortiGuard Services are continuously updated by the FortiGuard Global Security \
Research Team, which enables Fortinet to 

deliver a combination of multi-layered security intelligence and true zero-day protection from \
new and emerging threats. These updates are 

delivered to all FortiGate, FortiMail and FortiClient products. Fortinet strictly follows \
responsible disclosure guidelines to ensure 

optimum protection during a threat's lifecycle.

Acknowledgement:
================

Xiaopeng Zhang of Fortinet's FortiGuard Labs

References:
===========

http://www.fortiguard.com/advisory/FGA-2011-40.html
http://www-01.ibm.com/support/docview.wss?uid=swg21575247

CVE ID: CVE-2011-1393
http://www.cve.mitre.org/cgi-bin/cvename.cgi?name=2011-1393

***  Please note that this message and any attachments may contain confidential 
and proprietary material and information and are intended only for the use of 
the intended recipient(s). If you are not the intended recipient, you are hereby 
notified that any review, use, disclosure, dissemination, distribution or copying 
of this message and any attachments is strictly prohibited. If you have received 
this email in error, please immediately notify the sender and destroy this e-mail 
and any attachments and all copies, whether electronic or printed.
Please also note that any views, opinions, conclusions or commitments expressed 
in this message are those of the individual sender and do not necessarily reflect 
the views of Fortinet, Inc., its affiliates, and emails are not binding on 
Fortinet and only a writing manually signed by Fortinet's General Counsel can be 
a binding commitment of Fortinet to Fortinet's customers or partners. Thank you. ***
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/
_______________________________________________
Full-Disclosure - We believe in it.
Charter: http://lists.grok.org.uk/full-disclosure-charter.html
Hosted and sponsored by Secunia - http://secunia.com/


[prev in list] [next in list] [prev in thread] [next in thread] 

Configure | About | News | Add a list | Sponsored by KoreLogic