Vulnerability Assessment & Network Security Forums



If through a vulnerability assessment, a network security issue is detected for the vulnerability below, applying the appropriate security patches in a timely matter is very important.  If you have detected that your system has already been compromised, following CERT's Network Security recovery document will assist with recommended steps for system recovery.


Home >> Browse Vulnerability Assessment Database >> Web Servers >> Lotus Notes ?OpenServer Information Disclosure


Vulnerability Assessment Details

Lotus Notes ?OpenServer Information Disclosure

Vulnerability Assessment Summary
Lotus Notes ?OpenServer Information Disclosure

Detailed Explanation for this Vulnerability Assessment

A default behavior of Lotus Notes permits remote users to enumerate existing databases on a remote Domino (Lotus Notes) server. This information is considered sensitive, since it might reveal versions, logs, statistics, etc.

Solution: To disable this behavior open names.nsf and edit the Servers document in the Server view. From the Internet Protocols tab set 'Allow HTTP Clients to browse databases' to No.
This command doesn't affect a single database - it is a server-wide issue.

Network Security Threat Level: Medium

Additional information:
http://www.securiteam.com/securitynews/6W0030U35W.html
http://online.securityfocus.com/archive/1/223810


Networks Security ID:

Vulnerability Assessment Copyright: This script is Copyright (C) 2001 SecuriTeam

Cables, Connectors

2U IBM x3650 M3 "12-Core", 2x Xeon E5645 2.4GHz 98GB RAM ServeRAID M5014
$0.75
2U IBM x3650 M3 45W1959 IBM Intel Quad Port Gigabit Server Network Adapter PRO/1000PT LOT*5
$99.99
45W1959 IBM Intel Quad Port Gigabit Server Network Adapter PRO/1000PT LOT*5 pictureTS2900 Tape Autoloader (incl LTO6 HH SAS Tape Drive)
$609.71
TS2900 Tape Autoloader (incl LTO6 HH SAS Tape Drive) pictureIBM 00D9374 00D9375 N31820F RIGHT AND LEFT SERVER RAIL KIT
$100.0
IBM 00D9374 00D9375 N31820F RIGHT AND LEFT SERVER RAIL KIT picture


Discussions

No Discussions have been posted on this vulnerability.