IBM Domino 8.5.x < 8.5.3 Fix Pack 6 Interim Fix 2 NX Memory Protection Disabled

medium Nessus Plugin ID 73967
New! Plugin Severity Now Using CVSS v3

The calculated severity for Plugins has been updated to use CVSS v3 by default. Plugins that do not have a CVSS v3 score will fall back to CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Synopsis

The remote server is affected by a buffer overflow vulnerability.

Description

According to its banner, the version of IBM Domino (formerly IBM Lotus Domino) on the remote host is 8.5.x prior to 8.5.3 Fix Pack 6 (FP6) Interim Fix 2 (IF2). It is, therefore, more susceptible to exploitation due to the GCC '-z execstack' flag being used during compilation. This flag disables the memory protection provided by the No eXecute (NX) bit allowing remote attackers to execute arbitrary code more easily.

Note that this issue only affects Linux hosts running 32-bit versions of Domino.

Solution

Upgrade to IBM Domino 8.5.3 FP6 IF2 or later.

See Also

http://www-01.ibm.com/support/docview.wss?uid=swg21670264

http://www.nessus.org/u?ffc42f0b

Plugin Details

Severity: Medium

ID: 73967

File Name: domino_8_5_3fp6_if2.nasl

Version: 1.4

Type: remote

Family: Misc.

Published: 5/12/2014

Updated: 7/10/2018

Dependencies: domino_installed.nasl, os_fingerprint.nasl

Configuration: Enable paranoid mode

Risk Information

VPR

Risk Factor: Low

Score: 2.7

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 3.7

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Temporal Vector: E:U/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:ibm:lotus_domino

Required KB Items: Domino/Version, Host/OS, Settings/ParanoidReport

Exploit Ease: No known exploits are available

Patch Publication Date: 4/18/2014

Vulnerability Publication Date: 4/18/2014

Reference Information

CVE: CVE-2014-0892

BID: 67014

CERT: 350089