IBM Lotus Notes 8.5.1 / 8.5.2 / 8.5.3 < 8.5.3 FP3 Multiple Vulnerabilities

This script is Copyright (C) 2012-2017 Tenable Network Security, Inc.

Synopsis :

The remote host has software installed that is affected by multiple

Description :

The remote host has a version of Lotus Notes 8.5.1, 8.5.2, or 8.5.3.x
prior to 8.5.3 Fix Pack 3 installed. It is, therefore, reportedly
affected by the following vulnerabilities :

- The included version of the IBM Java SDK contains a
version of the IBM JRE that contains several errors
that allow Java code execution outside the Java
sandbox. (CVE-2012-4820, CVE-2012-4821, CVE-2012-4822,

- Information disclosure is possible because the
application does not set the 'HttpOnly' flag in the
'Set-Cookie' HTTP header. This can allow client-side
scripts to read or modify HTTP cookie information.

Note that applying the Java patch (Reference #1616652) alone does not
correct the 'HttpOnly' information disclosure vulnerability.

Further note that in the case of version 8.5.3 Fix Pack 2, if the
Java patch (Reference #1616652) and the interim fix (853FP2IF3) have
been applied, this may be a false positive.

See also :

Solution :

Upgrade to Lotus Notes 8.5.3 Fix Pack 3 or later. Alternatively, if
version 8.5.3 Fix Pack 2 is in use, install the Java patch
(Reference #1616652) and the interim fix 853FP2IF3.

Risk factor :

High / CVSS Base Score : 9.3
CVSS Temporal Score : 8.1
Public Exploit Available : true

Family: Windows

Nessus Plugin ID: 63281 ()

Bugtraq ID: 55495

CVE ID: CVE-2012-4820

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now