IBM Lotus Notes 8.5.1 / 8.5.2 / 8.5.3 < 8.5.3 FP3 Multiple Vulnerabilities

High Nessus Plugin ID 63281

Synopsis

The remote host has software installed that is affected by multiple vulnerabilities.

Description

The remote host has a version of Lotus Notes 8.5.1, 8.5.2, or 8.5.3.x prior to 8.5.3 Fix Pack 3 installed. It is, therefore, reportedly affected by the following vulnerabilities :

- The included version of the IBM Java SDK contains a version of the IBM JRE that contains several errors that allow Java code execution outside the Java sandbox. (CVE-2012-4820, CVE-2012-4821, CVE-2012-4822, CVE-2012-4823)

- Information disclosure is possible because the application does not set the 'HttpOnly' flag in the 'Set-Cookie' HTTP header. This can allow client-side scripts to read or modify HTTP cookie information.
(CVE-2012-4846)

Note that applying the Java patch (Reference #1616652) alone does not correct the 'HttpOnly' information disclosure vulnerability.

Further note that in the case of version 8.5.3 Fix Pack 2, if the Java patch (Reference #1616652) and the interim fix (853FP2IF3) have been applied, this may be a false positive.

Solution

Upgrade to Lotus Notes 8.5.3 Fix Pack 3 or later. Alternatively, if version 8.5.3 Fix Pack 2 is in use, install the Java patch (Reference #1616652) and the interim fix 853FP2IF3.

See Also

http://www.nessus.org/u?e0805b61

http://www-01.ibm.com/support/docview.wss?uid=swg21620361

http://www-01.ibm.com/support/docview.wss?uid=swg21616652

http://www-01.ibm.com/support/docview.wss?uid=swg21617185

Plugin Details

Severity: High

ID: 63281

File Name: lotus_notes_8_5_3_fp3.nasl

Version: 1.7

Type: local

Agent: windows

Family: Windows

Published: 2012/12/17

Updated: 2018/07/14

Dependencies: 61486

Risk Information

Risk Factor: High

CVSS v2.0

Base Score: 9.3

Temporal Score: 6.9

Vector: CVSS2#AV:N/AC:M/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:lotus_notes

Required KB Items: SMB/Lotus_Notes/Installed

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2012/11/26

Vulnerability Publication Date: 2012/09/11

Reference Information

CVE: CVE-2012-4820, CVE-2012-4821, CVE-2012-4822, CVE-2012-4823, CVE-2012-4846

BID: 55495, 56944