Lotus Domino SMTP Server ENVID Buffer Overflow and DoS Vulnerability

BID:1905

Info

Lotus Domino SMTP Server ENVID Buffer Overflow and DoS Vulnerability

Bugtraq ID: 1905
Class: Boundary Condition Error
CVE:
Remote: Yes
Local: No
Published: Nov 03 2000 12:00AM
Updated: Nov 03 2000 12:00AM
Credit: This vulnerability was first announced in a S.A.F.E.R Advisory on November 3, 2000.
Vulnerable: Lotus Domino Mail Server 5.0.4
Lotus Domino Mail Server 5.0.3
- HP HP-UX 11.0 4
- IBM AIX 4.3.2
- Linux kernel 2.2 .x
- Microsoft Windows NT 4.0
- Sun Solaris 7.0
Lotus Domino Mail Server 5.0.2 b
Lotus Domino Mail Server 5.0.2
- HP HP-UX 11.0 4
- IBM AIX 4.3.2
- Linux kernel 2.2 .x
- Microsoft Windows NT 4.0
- Sun Solaris 7.0
Lotus Domino Mail Server 5.0.1
- HP HP-UX 11.0 4
- IBM AIX 4.3.2
- Linux kernel 2.2 .x
- Microsoft Windows NT 4.0
- Sun Solaris 7.0
Lotus Domino Enterprise Server 5.0.4
Lotus Domino Enterprise Server 5.0.3
- HP HP-UX 11.0 4
- IBM AIX 4.3.2
- Linux kernel 2.2 .x
- Microsoft Windows NT 4.0
- Sun Solaris 7.0
Lotus Domino Enterprise Server 5.0.2 b
Lotus Domino Enterprise Server 5.0.2
- HP HP-UX 11.0 4
- IBM AIX 4.3.2
- Linux kernel 2.2 .x
- Microsoft Windows NT 4.0
- Sun Solaris 7.0
Lotus Domino Enterprise Server 5.0.1
- HP HP-UX 11.0 4
- IBM AIX 4.3.2
- Linux kernel 2.2 .x
- Microsoft Windows NT 4.0
- Sun Solaris 7.0
Not Vulnerable:

Discussion

Lotus Domino SMTP Server ENVID Buffer Overflow and DoS Vulnerability

The Lotus SMTP Server is part of the integrated solutions offered in Lotus Domino and Notes server software packages. A vulnerability exists in the SMTP server that can allow a malicious user to remotely execute code on the server.

The problem exists in the ENVID variable, as specified in RFC 1891. The SMTP server does not conduct adequate bounds checking on the ENVID keyword of the "MAIL FROM:" field. This makes it possible for a malicious user to custom craft an ENVID that could result in remote execution of code as the UID the SMTP server is operating as.

In the event of successful overflow, the Notes server will crash and all Notes services will discontinue functioning, regardless of successful execution of code. The Notes server will then require a manual restart, and additionally may require manual removal of mail.box and/or log.nsf files.

Exploit / POC

Lotus Domino SMTP Server ENVID Buffer Overflow and DoS Vulnerability

Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected]

Solution / Fix

Lotus Domino SMTP Server ENVID Buffer Overflow and DoS Vulnerability

Solution:
S.A.F.E.R recommends all users of Lotus Packages upgrade to the most recent release, currently 5.05. A link to the Lotus update page follows:


Lotus Domino Mail Server 5.0.1

Lotus Domino Enterprise Server 5.0.1

Lotus Domino Mail Server 5.0.2

Lotus Domino Enterprise Server 5.0.2

Lotus Domino Mail Server 5.0.2 b

Lotus Domino Enterprise Server 5.0.2 b

Lotus Domino Mail Server 5.0.3

Lotus Domino Enterprise Server 5.0.3

Lotus Domino Mail Server 5.0.4

Lotus Domino Enterprise Server 5.0.4

References

Lotus Domino SMTP Server ENVID Buffer Overflow and DoS Vulnerability

References:
© CVE.report 2026 |

Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.

CVE, CWE, and OVAL are registred trademarks of The MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. This site includes MITRE data granted under the following license.

Free CVE JSON API cve.report/api

CVE.report and Source URL Uptime Status status.cve.report