First published: Fri May 03 2002(Updated: )
Lotus Domino server 5.0.8 with NoBanner enabled allows remote attackers to (1) determine the physical path of the server via a request for a nonexistent file with a .pl (Perl) extension, which leaks the pathname in the error message, or (2) make any request that causes an HTTP 500 error, which leaks the server's version name in the HTTP error message.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
IBM Lotus Domino | =5.0.6a | |
IBM Lotus Domino | =5.0.6 | |
IBM Lotus Domino | =5.0.4 | |
IBM Lotus Domino | =5.0.9 | |
IBM Lotus Domino | =5.0.7a | |
IBM Lotus Domino | =5.0.1 | |
IBM Lotus Domino | =5.0.4a | |
IBM Lotus Domino | =5.0.3 | |
IBM Lotus Domino | =5.0.2 | |
IBM Lotus Domino | =5.0.5 | |
IBM Lotus Domino | =5.0.7 | |
IBM Lotus Domino | =5.0 | |
IBM Lotus Domino | =5.0.8 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-0245 is categorized as a moderate security vulnerability affecting Lotus Domino server 5.0.8 and earlier versions.
To mitigate CVE-2002-0245, it is recommended to upgrade to a patched version of Lotus Domino or disable the NoBanner feature.
CVE-2002-0245 may allow remote attackers to gain information about the server's file structure and potentially exploit further vulnerabilities.
CVE-2002-0245 affects Lotus Domino versions 5.0, 5.0.1, 5.0.2, 5.0.3, 5.0.4, 5.0.4a, 5.0.5, 5.0.6, 5.0.6a, 5.0.7, 5.0.7a, 5.0.8, and 5.0.9.
No, CVE-2002-0245 does not offer remote code execution capabilities, but it can lead to information disclosure.