Vulnerability Name:

CCN-22981

Published:2005-11-04
Updated:2005-11-04
Summary:Lotus Domino is vulnerable to a denial of service caused by a vulnerability in the AMGR task. A remote attacker could send an email containing a long subject field of more than 256 characters which, once the message is processed by the AMGR task for an out-of-office reply, would cause the task to crash.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Low
CVSS v2 Severity:5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): None
Availibility (A): Partial
Vulnerability Consequences:Denial of Service
References:Source: CCN
Type: IBM Advisory # 1178185
Domino server crashes on AMGR when the OutOfOffice agent attempts to reply to a long Subject field

Source: CCN
Type: BID-15321
IBM Lotus Domino Multiple Vulnerabilities

Source: XF
Type: UNKNOWN
lotusdomino-ooo-subject-dos(22981)

Vulnerable Configuration:Configuration CCN 1:
  • cpe:/a:ibm:lotus_domino:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_domino:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_domino:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_domino:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_domino:6.5.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_domino:6.5.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_domino:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_domino:6.5.4.1:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ibm lotus domino 6.5.1
    ibm lotus domino 6.5.2
    ibm lotus domino 6.5.4
    ibm lotus domino 6.5.3
    ibm lotus domino 6.5.2.1
    ibm lotus domino 6.5.3.1
    ibm lotus domino 6.5
    ibm lotus domino 6.5.4.1