IBM Lotus Notes < 8.5.3 FP2 URL Handler Unspecified Remote Code Execution

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.


Synopsis :

The remote host has software installed that is affected by a code
execution vulnerability.

Description :

The remote host has a version of Lotus Notes prior to 8.5.3 Fix Pack
2 installed. It is, therefore, reportedly affected by a remote code
execution vulnerability that an attacker can exploit by tricking a
victim into clicking a specially crafted 'notes://' URL.

Note that this vulnerability can only be exploited when the software
is running in 'standard' mode.

See also :

http://www.zerodayinitiative.com/advisories/ZDI-12-154/
http://seclists.org/fulldisclosure/2012/Aug/275
http://www.ibm.com/support/docview.wss?uid=swg21598348

Solution :

Upgrade to Lotus Notes 8.5.3 Fix Pack 2 or later.

Risk factor :

High / CVSS Base Score : 9.3
(CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C)
CVSS Temporal Score : 7.7
(CVSS2#E:F/RL:OF/RC:ND)
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 61487 ()

Bugtraq ID: 54070

CVE ID: CVE-2012-2174

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now