Lotus Notes R5 S/MIME Vulnerability
BID:1925
Info
Lotus Notes R5 S/MIME Vulnerability
| Bugtraq ID: | 1925 |
| Class: | Design Error |
| CVE: |
CVE-2000-1138 |
| Remote: | Yes |
| Local: | Yes |
| Published: | Nov 08 2000 12:00AM |
| Updated: | Jul 11 2009 03:56AM |
| Credit: | Discovered and posted to Bugtraq by Vinci Chou <[email protected]> on Nov 8, 2000. |
| Vulnerable: |
Lotus Notes Client 5.0.5 Lotus Notes Client 5.0.4 Lotus Notes Client 5.0.3 Lotus Notes Client 5.0.2 Lotus Notes Client 5.0.1 Lotus Notes Client 5.0 |
| Not Vulnerable: | |
Discussion
Lotus Notes R5 S/MIME Vulnerability
Lotus Notes R5 Client enables users to combine e-mail, calendaring, group scheduling, contact and task management, Web browsing, and knowledge management into a single application. Lotus Notes supports the S/MIME standard which is a secure method of sending and receiving email, allowing messages to be encrypted and sending digital certificates as part of the message.
Due to the implementation of the S/MIME standard with Lotus Notes R5 Client, a user receiving email is not notified if the mail has been tampered with.
Upon receiving a mail message with a broken signature the message will appear to be an unsigned email. Lotus Notes will not notify a user if the mail has been modified by a third party. When receiving a corrupted encrypted email, the mail message will appear to be blank. Again Lotus Notes will not inform a user of corruption.
Since Lotus Notes does not tell the user about corrupted signed messages, this vulnerability may allow attackers to corrupt signed messages in transit and not have them noticed by the recipient (though they will be listed as unsigned).
Lotus Notes R5 Client enables users to combine e-mail, calendaring, group scheduling, contact and task management, Web browsing, and knowledge management into a single application. Lotus Notes supports the S/MIME standard which is a secure method of sending and receiving email, allowing messages to be encrypted and sending digital certificates as part of the message.
Due to the implementation of the S/MIME standard with Lotus Notes R5 Client, a user receiving email is not notified if the mail has been tampered with.
Upon receiving a mail message with a broken signature the message will appear to be an unsigned email. Lotus Notes will not notify a user if the mail has been modified by a third party. When receiving a corrupted encrypted email, the mail message will appear to be blank. Again Lotus Notes will not inform a user of corruption.
Since Lotus Notes does not tell the user about corrupted signed messages, this vulnerability may allow attackers to corrupt signed messages in transit and not have them noticed by the recipient (though they will be listed as unsigned).
Exploit / POC
Lotus Notes R5 S/MIME Vulnerability
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Currently the SecurityFocus staff are not aware of any exploits for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution / Fix
Lotus Notes R5 S/MIME Vulnerability
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].
Solution:
Currently the SecurityFocus staff are not aware of any vendor supplied patches for this issue. If you feel we are in error or are aware of more recent information, please mail us at: [email protected].