NIST Site Search
Search NIST.GOV
Custom Search
[Official NIST.GOV TIME]
Product Research

Advertise on this site
Lotus Notes vulnerable to MS Windows graphics rendering engine bug
print the content item {PDF=create pdf file of the content item^plugin:content.25}
in General IT Security > Vulnerabilities


As originally discovered by John Herron at NIST.org (posted below) Lotus Notes is vulnerable to the WMF exploit.

IBM Has released a technical bulletin that points out that their Lotus Notes product is vulnerable to the WMF exploit as follows:

Lotus Notes accesses shimgvw.dll under the following circumstances:
  • When opening (launching) an image file attachment
  • When double clicking on (activating) an OLE object that uses the image viewer control
  • When the form is set to auto-launch first OLE object and the object uses the image control. In received emails, you have to say "Yes" to launch it before it will activate the object
  • When creating an OLE object that uses the image control
  • When browsing for a file in a folder (which is set to display thumbnails) that contains any image file



Update 3 Jan 2006: Further research is indicating that Lotus Notes code is probably not directly vulnerable. However, Lotus Notes uses Windows function calls for file browsing and when attaching or saving a file it's Windows that calls the vulnerable "shimgvw.dll" file. The Sysinternals Filemon program attributes calls to the shimgvw.dll to Lotus Notes even though it is not actually the nlnotes.exe calling the DLL directly as the screenshot indicates. Many applications call on Windows for file browsing, not just Lotus Notes. However this does not mean that all is well. If you use Windows XP it will create thumbnails of images when browsing folders through Notes and that's enough to trigger the exploit in an infected file. It's highly recommended that you install the unofficial Microsoft patch now, before its too late. See the following article for more information and a link to the patch (this patch is recommended by both SANS.org and NIST.org, as well as several antivirus companies).

Here is IBM's Technote on the matter.




----- Original posting
Lotus Notes uses the same vulnerable shimgvw.dll graphics rendering engine file implicated in the Microsoft Security Advisory (912840) to view image file attachments. Because of this, all Lotus Notes users are vulnerable to the WMF zero-day exploit. At this point there is little that can be done except block all incoming images at the perimeter.

Someone, or an email worm, simply needs to email a person a message with a graphics file attachment. It doesn't matter if the person Views or Opens (Runs) the attachment the shimgvw.dll will be used to render the image and the malicious file can compromise the computer.

To verify that Lotus Notes uses the vulnerable DLL file a program called FileMon was used:

Image: /nist_plugins/content/images/image/notes_using_shimgvw_dll.jpg

The following screenshot shows the attached image that was viewed above. Note that the WMF file had been renamed to have a .JPG extension. The image was still viewed as normal.
Image: /nist_plugins/content/images/image/Renamed_WMF_File.jpg

This vulnerabilty can be exploited by malicious people to compromise a vulnerable system. NOTE: Exploit code is publicly available. This is being exploited in the wild.

Lotus Notes vulnerability discovered by John Herron // NIST.org



Translate to: {GOOGLETRANS}
Google Ads




Headlines

»CVE-2004-0678 (chat_server)
Cross-site scripting (XSS) in one2planet.infolet.InfoServlet in 12Planet Chat Server 2.9 allows remo ...
»CVE-2011-3925 (chrome)
Use-after-free vulnerability in the Safe Browsing feature in Google Chrome before 16.0.912.75 allows ...
»CVE-2011-3927 (chrome)
Skia, as used in Google Chrome before 16.0.912.77, does not perform all required initialization of v ...
»CVE-2012-2520 (groove_server, infopath, lync, office_communicator, office_web_apps, sharepoint_foundation, sharepoint_server, sharepoint_services)
Cross-site scripting (XSS) vulnerability in Microsoft InfoPath 2007 SP2 and SP3 and 2010 SP1, Commun ...
»CVE-2012-2521 (internet_explorer)
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows rem ...
»CVE-2012-2522 (internet_explorer)
Microsoft Internet Explorer 6 through 9 does not properly handle objects in memory, which allows rem ...
»CVE-2012-2523 (internet_explorer, jscript, vbscript)
Integer overflow in Microsoft Internet Explorer 8 and 9, JScript 5.8, and VBScript 5.8 on 64-bit pla ...
»CVE-2012-2524 (office)
Microsoft Office 2007 SP2 and SP3 and 2010 SP1 allows remote attackers to execute arbitrary code or ...
»CVE-2012-2526 (windows_xp)
The Remote Desktop Protocol (RDP) implementation in Microsoft Windows XP SP3 does not properly proce ...
»CVE-2012-2527 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 an ...
»CVE-2012-2528 (office_compatibility_pack, office_web_apps, word, word_automation_services, word_viewer)
Use-after-free vulnerability in Microsoft Word 2003 SP3, 2007 SP2 and SP3, and 2010 SP1; Word Viewer ...
»CVE-2012-2529 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
Integer overflow in the kernel in Microsoft Windows XP SP2 and SP3, Windows Server 2003 SP2, Windows ...
»CVE-2012-2530 (windows_7, windows_server_2003, windows_server_2008, windows_vista, windows_xp)
Use-after-free vulnerability in win32k.sys in the kernel-mode drivers in Microsoft Windows XP SP2 an ...
»CVE-2012-2531 (iis)
Microsoft Internet Information Services (IIS) 7.5 uses weak permissions for the Operational log, whi ...
»CVE-2012-4074 (unified_computing_system)
The Board Management Controller (BMC) in the Serial over LAN (SoL) subsystem in Cisco Unified Comput ...


Date published: 2016-09-27T04:50:05Z
Details

»OpenSSL Releases Security Updates
Original release date: September 23, 2016 | Last revised: September 26, 2016 OpenSSL has rele ...
»FTC Releases Data Breach Recovery and Prevention Video
Original release date: September 22, 2016 The Federal Trade Commission (FTC) has released a s ...
»Drupal Releases Security Advisory
Original release date: September 21, 2016 Drupal has released an advisory to address vulnerab ...
»Cisco Releases Security Updates
Original release date: September 21, 2016 Cisco has released security updates to address vuln ...
»Mozilla Releases Security Updates
Original release date: September 20, 2016 Mozilla has released security updates to address mu ...
»Apple Releases Security Updates
Original release date: September 20, 2016 Apple has released security updates to address vuln ...
»Cisco Releases Security Updates
Original release date: September 16, 2016 Cisco has released security updates to address a vu ...
»VMWare Releases Security Updates
Original release date: September 16, 2016 VMware has released a security update to address vu ...
»Cisco Releases Security Updates
Original release date: September 15, 2016 Cisco has released security updates to address vuln ...
»Google Releases Security Update for Chrome
Original release date: September 14, 2016 Google has released Chrome version 53.0.2785.113 to ...


Date published: not known
Details

»“Cybersecurity is, at its core, a people problem,” says VB2016 keynote speaker
An interview with VB2016’s keynote speaker Christine Whalley - Dire ...
»Throwback Thursday: Following the Breadcrumbs
In 1999, Christine Orshesky described how one large organization de ...
»VB2016 preview: Cryptography mistakes in malware
At VB2016, two talks will discuss mistakes made by malware authors ...
»GPS technology is more at risk from cyber attack than ever before, security expert demonstrates at VB2016
Next month at VB2016, HPE Security's Oleg Petrovsky will speak abou ...
»BSides Denver: Join and Support the Security Community
If you are coming to VB2016 in Denver, why not spend an extra day i ...
»VB2016 'Last-Minute' Papers Announced
We are excited to announce the addition of the "last-minute ...
»VB2016 preview: Debugging and Monitoring Malware Network Activities with Haka
In a VB2016 paper, Stormshield researchers Benoit Ancel and Mehdi T ...
»Paper: Behavioural Detection and Prevention of Malware on OS X
In a new paper published through Virus Bulletin, Vincent Van Mieghe ...
»VB2016 preview: Smart Outlets. Why We Need Responsible Disclosure!
At VB2016, four researcher from Bitdefender will present a paper in ...


Date published: not known
Details
Main Menu
· Home
Current Security News
 
US-CERT Current Activity

» OpenSSL Releases Security Updates
[23 Sep 2016 01:13pm]

» FTC Releases Data Breach Recovery and Prevention Video
[22 Sep 2016 11:21am]

» Drupal Releases Security Advisory
[21 Sep 2016 06:49pm]

» Cisco Releases Security Updates
[21 Sep 2016 06:36pm]

» Mozilla Releases Security Updates
[20 Sep 2016 03:02pm]

» Apple Releases Security Updates
[20 Sep 2016 01:56pm]

» Cisco Releases Security Updates
[16 Sep 2016 07:31pm]

» VMWare Releases Security Updates
[16 Sep 2016 02:17am]

» Cisco Releases Security Updates
[15 Sep 2016 03:46am]

» Google Releases Security Update for Chrome
[14 Sep 2016 05:14am]

***
US-CERT Alerts

» TA16-250A: The Increasing Threat to Network Infrastructure Devices and Recommended Mitigations
[06 Sep 2016 04:29pm]

» TA16-187A: Symantec and Norton Security Products Contain Critical Vulnerabilities
[05 Jul 2016 08:50am]

» TA16-144A: WPAD Name Collision Vulnerability
[23 May 2016 05:38am]

» TA16-132A: Exploitation of SAP Business Applications
[11 May 2016 05:31am]

» TA16-105A: Apple Ends Support for QuickTime for Windows; New Vulnerabilities Announced
[14 Apr 2016 01:48pm]

» TA16-091A: Ransomware and Recent Variants
[31 Mar 2016 04:00pm]

» TA15-337A: Dorkbot
[03 Dec 2015 04:40pm]

» TA15-314A: Compromised Web Servers and Web Shells - Threat Awareness and Guidance
[10 Nov 2015 06:12pm]

» TA15-286A: Dridex P2P Malware
[13 Oct 2015 05:23am]

» TA15-240A: Controlling Outbound DNS Access
[28 Aug 2015 11:31am]

***
Computerworld Security

» Your users have porous passwords? Blame yourself, IT.
[27 Sep 2016 05:00am]

» Yahoo's claim of 'state-sponsored' hackers meets with skepticism
[27 Sep 2016 04:34am]

» 34% off Master Lock Bluetooth Keyless Outdoor Padlock - Deal Alert
[26 Sep 2016 03:05pm]

» New Mac Trojan uses the Russian space program as a front
[26 Sep 2016 02:58pm]

» Va. senator wants SEC probe of massive Yahoo breach
[26 Sep 2016 12:25pm]

» Armies of hacked IoT devices launch unprecedented DDoS attacks
[26 Sep 2016 11:25am]

» iOS 10 backups are easier to crack, but Apple promises to fix security flaw
[26 Sep 2016 10:06am]

» Here's how Microsoft is using containerization to protect Edge users
[26 Sep 2016 07:26am]

» Trump hotel chain fined over data breaches
[26 Sep 2016 05:31am]

» The Social Security website is now secure
[25 Sep 2016 03:56pm]

» Companies say IoT matters but vary on how to secure it
[23 Sep 2016 06:34pm]

» What you should know, and do, about the Yahoo breach
[23 Sep 2016 11:26am]

» Privacy groups call for FTC probe of WhatsApp promises
[23 Sep 2016 09:25am]

» Vint Cerf's dream do-over: 2 ways he'd make the internet different
[23 Sep 2016 05:17am]

» How the Yahoo breach affects you
[23 Sep 2016 04:43am]

***
Microsoft Security Advisories

» 3181759 - Vulnerabilities in ASP.NET Core View Components Could Allow Elevation of Privilege - Version: 1.0
[13 Sep 2016 11:00am]

» 3174644 - Updated Support for Diffie-Hellman Key Exchange - Version: 1.0
[13 Sep 2016 11:00am]

» 3179528 - Update for Kernel Mode Blacklist - Version: 1.0
[09 Aug 2016 11:00am]

» 2880823 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 2.0
[18 May 2016 11:00am]

» 3155527 - Update to Cipher Suites for FalseStart - Version: 1.0
[10 May 2016 11:00am]

» 3152550 - Update to Improve Wireless Mouse Input Filtering - Version: 1.1
[22 Apr 2016 11:00am]

» 3137909 - Vulnerabilities in ASP.NET Templates Could Allow Tampering - Version: 1.1
[10 Feb 2016 11:00am]

» 2871997 - Update to Improve Credentials Protection and Management - Version: 5.0
[09 Feb 2016 11:00am]

» 3123479 - Deprecation of SHA-1 Hashing Algorithm for Microsoft Root Certificate Program - Version: 1.0
[12 Jan 2016 11:00am]

» 3109853 - Update to Improve TLS Session Resumption Interoperability - Version: 1.0
[12 Jan 2016 11:00am]

» 3118753 - Updates for ActiveX Kill Bits 3118753 - Version: 1.0
[12 Jan 2016 11:00am]

» 2755801 - Update for Vulnerabilities in Adobe Flash Player in Internet Explorer and Microsoft Edge - Version: 53.0
[05 Jan 2016 11:00am]

» 3123040 - Inadvertently Disclosed Digital Certificate Could Allow Spoofing - Version: 1.0
[08 Dec 2015 11:00am]

» 3057154 - Update to Harden Use of DES Encryption - Version: 1.1
[08 Dec 2015 11:00am]

» 3119884 - Inadvertently Disclosed Digital Certificates Could Allow Spoofing - Version: 1.0
[30 Nov 2015 11:00am]

***
WIRED

» Tesla Responds to Chinese Hack With a Major Security Upgrade
[27 Sep 2016 05:00am]

» Security News This Week: Hackers Take Control of a Moving Tesla’s Brakes
[24 Sep 2016 05:00am]

» Our Favorite Hacker Moments From Mr. Robot Season 2
[22 Sep 2016 12:18pm]

» Hack Brief: Yahoo Breach Hits Half a Billion Users
[22 Sep 2016 10:15am]

» Officials Are Scrambling to Protect the Election From Hackers
[21 Sep 2016 05:00am]

» Cloudflare Launches a Three-Pronged Attack to Encrypt the Entire Web
[20 Sep 2016 07:43am]

» How Police Trace Cellphones in IEDs Like the Ones in NYC
[19 Sep 2016 01:56pm]

» Inside Google’s Internet Justice League and Its AI-Powered War on Trolls
[19 Sep 2016 04:55am]

» Security News This Week: Congress Celebrates the Snowden Movie by Slamming Snowden
[17 Sep 2016 05:00am]

» U.K. Judge OKs Extradition to the U.S. for Hacktivist Lauri Love
[16 Sep 2016 09:07am]

***
Network World Security

» Security blogger Krebs says IoT DDoS attack was payback for a blog
[27 Sep 2016 06:52am]

» 10 ways to secure a mobile workforce
[27 Sep 2016 05:30am]

» How to mitigate hackers who farm their victims
[27 Sep 2016 05:29am]

» IDG Contributor Network: Always be prepared: Monitor, analyze and test your security
[27 Sep 2016 05:00am]

» Review: 5 open source alternatives for routers/firewalls
[12 Sep 2016 04:00am]

» Open source routers deliver low cost, flexibility
[12 Sep 2016 04:00am]

» Review: SentinelOne blocks and dissects threats
[31 Aug 2016 05:40am]

» Review: Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Top tools for preventing data leaks
[29 Aug 2016 04:00am]

» Review: Promisec goes the extra step to secure PCs
[13 Jul 2016 06:21am]

» 4 tools for managing firewall rules
[07 Jul 2016 11:03am]

» How to buy endpoint security products
[05 Jul 2016 04:00am]

» 7 trends in advanced endpoint protection
[05 Jul 2016 04:00am]

» Yahoo's claim of 'state-sponsored' hackers meets with skepticism
[26 Sep 2016 07:07pm]

» 34% off Master Lock Bluetooth Keyless Outdoor Padlock - Deal Alert
[26 Sep 2016 03:05pm]

***


More IT Security
News Feeds
More Sponsors

Advertise on this site
RSS Feeds
Our news can be syndicated by using these rss feeds.
rss1.0
rss2.0
rdf

NIST.org is in no way connected to the U.S. government site NIST.gov

This site is © John Herron, CISSP. All Rights Reserved.

Please visit daily to stay up to date on all your IT Security compliance issues.

http://www.nist.org -
Hosted by BlueHost. We've never had a better hosting company.
{THEMEDISCLAIMER}