Lotus Notes SAM Attachment exploit

There is a buffer overflow in lasr.dll when parsing an AMI Pro document(.sam) file. The unsafe lstrcpy() function is used to copy each line read from the file into fixed sized stack and heap buffers, with no length checks being performed. Hence, it is possible to create an AMI Pro file that contains overly long lines that will trigger the buffer overflow when viewed within Lotus Notes. In order to exploit this vulnerability successfully, the user must be convinced to view a malicious AMI Pro document file attachment using the built-in viewer in Lotus Notes.
Exploit type: 
Vulnerabilty ID: 
Released Date: 
Sunday, October 28, 2007 - 19:00