HostedDB - Dedicated UNIX Servers

-->
IT Baseline Protection Manual T 5.101 Hacking Lotus Notes

T 5.101 Hacking Lotus Notes

The data stored in the databases of the Notes server can also be made available for public access from the Internet. This imposes special requirements on the security of the Notes server used for this purpose. In this case, security loopholes could result in an adversary not only gaining unauthorised access to the Notes server itself but possibly also being able to penetrate the internal network which lies behind it.

Some of the problem areas and potential security loopholes which need to be considered, particularly where public access is allowed from the Internet to a Notes server, are listed below.


© Copyright by
Bundesamt für Sicherheit in der Informationstechnik
last update:
July 2001
home