Skip to main content

CVE-1999-1012: SMTP component of Lotus Domino 4.6.1 on AS/400, and possibly other operating systems, allows a remot

Medium
VulnerabilityCVE-1999-1012cve-1999-1012
Published: Tue May 04 1999 (05/04/1999, 04:00:00 UTC)
Source: NVD
Vendor/Project: lotus
Product: domino

Description

SMTP component of Lotus Domino 4.6.1 on AS/400, and possibly other operating systems, allows a remote attacker to crash the mail server via a long string.

AI-Powered Analysis

AILast updated: 07/01/2025, 18:11:44 UTC

Technical Analysis

CVE-1999-1012 is a medium-severity vulnerability affecting the SMTP component of Lotus Domino version 4.6.1 running on the AS/400 platform, and potentially other operating systems. The vulnerability arises from the SMTP server's improper handling of long input strings, which allows a remote attacker to send a specially crafted long string to the mail server and cause it to crash. This results in a denial of service (DoS) condition, disrupting mail services hosted on the affected Domino server. The vulnerability does not impact confidentiality or integrity, as it does not allow unauthorized access or data modification, but it does affect availability by crashing the mail server. The CVSS score of 5.0 reflects this medium severity, with the vector indicating network attack vector (AV:N), low attack complexity (AC:L), no authentication required (Au:N), no impact on confidentiality or integrity (C:N/I:N), and partial impact on availability (A:P). There is no patch available for this vulnerability, and no known exploits have been reported in the wild. Given the age of the software (Domino 4.6.1 was released in the late 1990s), this vulnerability is primarily relevant to legacy systems that have not been updated or decommissioned. The lack of a patch and the absence of known exploits suggest limited active threat, but the potential for disruption remains if such legacy systems are still in use and exposed to untrusted networks.

Potential Impact

For European organizations, the primary impact of CVE-1999-1012 is the potential denial of service against mail servers running Lotus Domino 4.6.1, particularly on AS/400 systems. This could disrupt internal and external email communications, affecting business operations, customer interactions, and potentially compliance with communication-related regulations. While modern organizations are unlikely to run such outdated software, some government agencies, financial institutions, or industrial entities may still operate legacy systems due to long upgrade cycles or specialized applications. Disruption of mail services could lead to operational delays and reputational damage. However, since the vulnerability does not allow data theft or manipulation, the risk to sensitive information is low. The lack of known exploits and the age of the software reduce the likelihood of widespread attacks, but targeted attacks against legacy infrastructure cannot be ruled out, especially in sectors where AS/400 systems remain in use.

Mitigation Recommendations

Given that no official patch is available, European organizations should prioritize the following mitigations: 1) Upgrade or replace Lotus Domino 4.6.1 servers with supported, updated versions that have addressed this and other vulnerabilities. 2) If upgrading is not immediately feasible, isolate affected servers from untrusted networks by implementing strict network segmentation and firewall rules to restrict SMTP traffic to trusted sources only. 3) Employ intrusion detection and prevention systems (IDS/IPS) to monitor for anomalous SMTP traffic patterns, such as unusually long strings or malformed packets targeting the mail server. 4) Regularly audit and inventory legacy systems to identify any remaining instances of Domino 4.6.1 or AS/400 mail servers and plan for their decommissioning. 5) Implement robust incident response plans to quickly restore mail services in case of a DoS attack. 6) Consider deploying SMTP gateways or proxies that can filter and sanitize incoming SMTP traffic before it reaches the vulnerable server.

Need more detailed analysis?Get Pro

Threat ID: 682ca32cb6fd31d6ed7defbc

Added to database: 5/20/2025, 3:43:40 PM

Last enriched: 7/1/2025, 6:11:44 PM

Last updated: 7/28/2025, 11:42:46 AM

Views: 11

Actions

PRO

Updates to AI analysis are available only with a Pro account. Contact root@offseq.com for access.

Please log in to the Console to use AI analysis features.

Need enhanced features?

Contact root@offseq.com for Pro access with improved analysis and higher rate limits.

Latest Threats