Synopsis
The remote client does not properly flag tampered messages.
Description
The remote host is running the Lotus Notes 5.x email client. Lotus Notes R5 client versions 5.0.5 and earlier could allow a remote attacker to send unsigned email messages as signed email messages, due to a vulnerability in the implementation of the S/MIME standard. Lotus Notes R5 client uses the S/MIME standard to securely send and receive messages with digital certificates. However, Lotus Notes fails to notify the recipient if the email being received has been tampered with. A remote attacker can corrupt signed messages in transit without the recipient being warned of the invalid signature. The message appears to the recipient as an unsigned message.
Solution
No known remedy as of August 2002 however at the time of writing Lotus Notes 6.0 is available.
Plugin Details
Risk Information
Vector: CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N
Vector: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N
Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C
Vulnerability Information
CPE: cpe:/a:ibm:lotus_notes