Vulnerability Name:

CVE-2006-5835 (CCN-30118)

Assigned:2006-11-08
Published:2006-11-08
Updated:2017-07-20
Summary:The Notes Remote Procedure Call (NRPC) protocol in IBM Lotus Notes Domino before 6.5.5 FP2 and 7.x before 7.0.2 does not require authentication to perform user lookups, which allows remote attackers to obtain the user ID file.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): None
Availibility (A): None
CVSS v2 Severity:5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.3 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N)
4.3 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N/E:H/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Obtain Information
References:Source: CCN
Type: Full-Disclosure Mailing List, Thu Nov 08 2007 - 06:58:57 CST
Lotus Notes pre-login User.ID key leak

Source: MITRE
Type: CNA
CVE-2006-5835

Source: CCN
Type: SA22741
IBM Lotus Domino NRPC Information Disclosure

Source: SECUNIA
Type: Patch, Vendor Advisory
22741

Source: CCN
Type: SECTRACK ID: 1017203
IBM Lotus Notes Lets Remote Users Determine Valid Usernames and Obtain User.ID Keyfiles

Source: SECTRACK
Type: UNKNOWN
1017203

Source: CONFIRM
Type: Patch
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21248026

Source: CCN
Type: IBM Technote (FAQ) 1248026
IBM Lotus Notes information leakage on port 1352

Source: CCN
Type: IBM Software Web site
IBM Lotus Notes

Source: CCN
Type: Fortconsult Security Advisory
Lotus Notes Port 1352 Pre-login Information Leakage

Source: MISC
Type: Exploit, Vendor Advisory
http://www.fortconsult.net/images/pdf/lotusnotes_keyfiles.pdf

Source: CCN
Type: OSVDB ID: 30255
IBM Lotus Domino Notes Remote Procedure Call (NRPC) User Name/ID Enumeration

Source: BID
Type: UNKNOWN
20960

Source: CCN
Type: BID-20960
IBM Lotus Notes User.ID File Key Information Disclosure Vulnerability

Source: VUPEN
Type: UNKNOWN
ADV-2006-4411

Source: XF
Type: UNKNOWN
lotusnotes-nrpc-information-disclosure(30118)

Source: XF
Type: UNKNOWN
lotusnotes-nrpc-information-disclosure(30118)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:ibm:lotus_notes:5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:5.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:6.5.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:5.0.12:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:5.0.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    ibm lotus notes 5.0.3
    ibm lotus notes 5.0.12
    ibm lotus notes 6.0
    ibm lotus notes 6.0.1
    ibm lotus notes 6.0.2
    ibm lotus notes 6.0.3
    ibm lotus notes 6.0.4
    ibm lotus notes 6.0.5
    ibm lotus notes 6.5
    ibm lotus notes 6.5.1
    ibm lotus notes 6.5.2
    ibm lotus notes 6.5.3
    ibm lotus notes 6.5.4
    ibm lotus notes 6.5.5
    ibm lotus notes 7.0
    ibm lotus notes 7.0.1
    ibm lotus notes 6.0.1
    ibm lotus notes 6.0.2
    ibm lotus notes 6.0.3
    ibm lotus notes 6.5
    ibm lotus notes 6.0
    ibm lotus notes 6.5.3
    ibm lotus notes 6.5.2
    ibm lotus notes 6.5.1
    ibm lotus notes 6.0.4
    ibm lotus notes 7.0
    ibm lotus notes 6.0.5
    ibm lotus notes 6.5.4
    ibm lotus notes 7.0.1
    ibm lotus notes 6.5.5
    ibm lotus notes 5.0.12
    ibm lotus notes 5.0.3