IBM patches Lotus flaw

Among vulnerabilities discovered, attacker could execute code when users access files through Notes attachment viewer.

IBM has issued a patch for a half dozen "highly critical" security flaws in versions of its Lotus Notes, which could allow a malicious attacker to execute arbitrary code remotely when users access files through the Notes attachment viewer.

The vulnerabilities affect versions of Lotus Notes 6.5.4 and 7.0 or earlier, according to an advisory released Friday by security firm Secunia, which discovered the flaws.

"This is big problem because a very large number of corporations use Lotus Notes," said Thomas Kristensen, Secunia's chief technology officer. "When users receive an e-mail with an attachment, all they have to do is click on the attachment to read it, and their systems are vulnerable to a remote attack."

IBM issued a security update, 7.0.1, this week and 6.5.5 in December.

"Secunia contacted IBM Lotus to report five buffer overflow vulnerabilities and one directory traversal vulnerability in the KeyView viewers used in Lotus Notes," IBM said its in its security advisory. "To successfully exploit these issues, an attacker would need to send a specially crafted file attachment to users, and the users would have double click and 'view' the attachment."

One flaw, for example, occurs when checking for the existence of a compressed file in a ZIP archive. Vulnerabilities in Notes could be exploited when a user extracts a compressed file with a long file name within the Notes attachment viewer, leading to a buffer overflow and remote execution of code, according to Secunia.

Users may also find their systems exploited when using the Notes attachment viewer to open an encoded file with an overly long file name. A malicious encoded file could result in a buffer overflow and remote code execution, Kristensen said.

Lotus' attachment viewer, a built-in function of the software, allows users to view a wide range of file formats without requiring the specific application to be installed on their system to read the file.

Other vulnerabilities found in Lotus Notes include a boundary error in the HTML speed reader. When a user views a malicious HTML document, an attacker would exploit the flaw and take over a user's system that was running Lotus Notes.

Featured Video
6
This content is rated TV-MA, and is for viewers 18 years or older. Are you of age?
Sorry, you are not old enough to view this content.

NYC taxis to compete with Uber

NYC taxis set to launch an app of their own, one billion people visit Facebook in a day, Chrome sets end date for Flash support and HTC's Vive VR headset gets delayed.

by Jeff Bakalar