IBM Lotus Domino iCalendar Remote Stack Buffer Overflow Vulnerability

Summary
The host is running IBM Lotus Domino Server and is prone to remote stack buffer overflow vulnerability.
Impact
Successful exploitation may allow remote attackers to execute arbitrary code in the context of the 'nrouter.exe' Lotus Domino server process. Failed attacks will cause denial-of-service conditions. Impact Level: Application/System
Solution
Upgrade to IBM Lotus Domino version 8.5.2, 8.5.1 Fix Pack 2 or 8.0.2 Fix Pack 5, For updates refer to http://www-01.ibm.com/software/lotus/products/domino/
Insight
The flaw is due to a boundary error in the 'MailCheck821Address()' function within nnotes.dll when copying an email address using the 'Cstrcpy()' library function. This can be exploited to cause a stack-based buffer overflow via an overly long 'ORGANIZER:mailto' iCalendar header.
Affected
IBM Lotus Domino Versions 8.0.x before 8.0.2 FP5 and 8.5.x before 8.5.1 FP2
References