Check Point Reference: | CPAI-2008-291 |
Date Published: | 8 Oct 2009 |
Severity: | High |
Last Updated: | Thursday 10 April, 2014 |
Source: | |
Industry Reference: | CVE-2008-1965 |
Protection Provided by: |
Security Gateway |
Who is Vulnerable? | |
Vulnerability Description | IBM Lotus Expeditor is a software framework for the development, integration and deployment of client applications. The framework include components that run on desktop computers, handheld devices, and management servers. There exist a buffer overflow vulnerability in IBM Lotus Symphony and Lotus Expeditor. The vulnerability is due to improper handling of "cai:" URIs in the Lotus Expeditor rcplauncher code that the Lotus Symphony utilizes. A remote user can exploit this vulnerability by creating a specially crafted 'cai:' URI and enticing the target user to load it. Successful exploitation will allow execution of arbitrary code on the target system. The code will run with the privileges of the target user. An attack targeting this vulnerability can result in command execution. If the attack is successful, the behaviour of the target will depend on the intention of the attacker. Any injected command will be executed within the security context of the currently logged in user. |
This protection will detect and block attempts to exploit this vulnerability
In order for the protection to be activated, update your Security Gateway product to the latest IPS update. For information on how to update IPS, go to SBP-2006-05, click on Protection tab and select the version of your choice.
This protection's log will contain the following information:
Attack Name: IBM Protection Violation.
Attack Information: IBM Lotus Expeditor cai URI handler command execution