Vulnerabilites related to autonomy - keyview_viewer_sdk
CVE-2007-6008 (GCVE-0-2007-6008)
Vulnerability from cvelistv5
Published
2007-11-15 22:00
Modified
2024-09-16 17:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in emlsr.dll before 2.0.0.4 in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK allows remote attackers to execute arbitrary code via a long Content-Type header line in an EML file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
► | URL | Tags | |||
---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:47:00.776Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "27304", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27304" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in emlsr.dll before 2.0.0.4 in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK allows remote attackers to execute arbitrary code via a long Content-Type header line in an EML file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-11-15T22:00:00Z", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "27304", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27304" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-6008", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in emlsr.dll before 2.0.0.4 in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK allows remote attackers to execute arbitrary code via a long Content-Type header line in an EML file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "27304", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27304" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-6008", "datePublished": "2007-11-15T22:00:00Z", "dateReserved": "2007-11-15T00:00:00Z", "dateUpdated": "2024-09-16T17:47:47.596Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0126 (GCVE-0-2010-0126)
Vulnerability from cvelistv5
Published
2010-08-17 17:31
Modified
2024-08-07 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in an unspecified library in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted compound file, as demonstrated using a Quattro Pro file, which is not properly handled by the Quattro speed reader (qpssr.dll).
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:53.832Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-16/" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in an unspecified library in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted compound file, as demonstrated using a Quattro Pro file, which is not properly handled by the Quattro speed reader (qpssr.dll)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-07T10:00:00", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-16/" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0126", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in an unspecified library in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted compound file, as demonstrated using a Quattro Pro file, which is not properly handled by the Quattro speed reader (qpssr.dll)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "http://secunia.com/secunia_research/2010-16/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-16/" }, { "name": "41928", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41928" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0126", "datePublished": "2010-08-17T17:31:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:53.832Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2008-4564 (GCVE-0-2008-4564)
Vulnerability from cvelistv5
Published
2009-03-18 15:00
Modified
2024-08-07 10:24
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T10:24:18.984Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/avcenter/security/Content/2009.03.17a.html" }, { "name": "ADV-2009-0744", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0744" }, { "name": "34303", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34303" }, { "name": "1021859", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://www.securitytracker.com/id?1021859" }, { "name": "34307", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34307" }, { "name": "autonomy-keyview-wp6sr-bo(49284)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49284" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?rs=463\u0026uid=swg21377573" }, { "name": "34318", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34318" }, { "name": "1021856", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1021856" }, { "name": "1021857", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1021857" }, { "name": "VU#276563", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/276563" }, { "name": "ADV-2009-0756", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0756" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html" }, { "name": "34355", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/34355" }, { "name": "52713", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://osvdb.org/52713" }, { "name": "20090317 Autonomy KeyView Word Perfect File Parsing Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE", "x_transferred" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774" }, { "name": "34086", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/34086" }, { "name": "ADV-2009-0757", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2009/0757" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2009-03-17T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-08-07T12:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/avcenter/security/Content/2009.03.17a.html" }, { "name": "ADV-2009-0744", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0744" }, { "name": "34303", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34303" }, { "name": "1021859", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://www.securitytracker.com/id?1021859" }, { "name": "34307", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34307" }, { "name": "autonomy-keyview-wp6sr-bo(49284)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49284" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?rs=463\u0026uid=swg21377573" }, { "name": "34318", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34318" }, { "name": "1021856", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1021856" }, { "name": "1021857", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1021857" }, { "name": "VU#276563", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/276563" }, { "name": "ADV-2009-0756", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0756" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html" }, { "name": "34355", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/34355" }, { "name": "52713", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://osvdb.org/52713" }, { "name": "20090317 Autonomy KeyView Word Perfect File Parsing Buffer Overflow Vulnerability", "tags": [ "third-party-advisory", "x_refsource_IDEFENSE" ], "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774" }, { "name": "34086", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/34086" }, { "name": "ADV-2009-0757", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2009/0757" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2008-4564", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/avcenter/security/Content/2009.03.17a.html", "refsource": "CONFIRM", "url": "http://www.symantec.com/avcenter/security/Content/2009.03.17a.html" }, { "name": "ADV-2009-0744", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0744" }, { "name": "34303", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34303" }, { "name": "1021859", "refsource": "SECTRACK", "url": "http://www.securitytracker.com/id?1021859" }, { "name": "34307", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34307" }, { "name": "autonomy-keyview-wp6sr-bo(49284)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49284" }, { "name": "http://www-01.ibm.com/support/docview.wss?rs=463\u0026uid=swg21377573", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?rs=463\u0026uid=swg21377573" }, { "name": "34318", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34318" }, { "name": "1021856", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1021856" }, { "name": "1021857", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1021857" }, { "name": "VU#276563", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/276563" }, { "name": "ADV-2009-0756", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0756" }, { "name": "https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html", "refsource": "CONFIRM", "url": "https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html" }, { "name": "34355", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/34355" }, { "name": "52713", "refsource": "OSVDB", "url": "http://osvdb.org/52713" }, { "name": "20090317 Autonomy KeyView Word Perfect File Parsing Buffer Overflow Vulnerability", "refsource": "IDEFENSE", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774" }, { "name": "34086", "refsource": "BID", "url": "http://www.securityfocus.com/bid/34086" }, { "name": "ADV-2009-0757", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2009/0757" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2008-4564", "datePublished": "2009-03-18T15:00:00", "dateReserved": "2008-10-14T00:00:00", "dateUpdated": "2024-08-07T10:24:18.984Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0131 (GCVE-0-2010-0131)
Vulnerability from cvelistv5
Published
2010-08-17 17:31
Modified
2024-08-07 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in the SpreadSheet Lotus 123 reader (wkssr.dll), as used in Autonomy KeyView 10.4 and 10.9, Symantec Mail Security, and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to floating point conversion in unknown record types.
References
► | URL | Tags | |||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:53.861Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-25/" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-23/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SpreadSheet Lotus 123 reader (wkssr.dll), as used in Autonomy KeyView 10.4 and 10.9, Symantec Mail Security, and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to floating point conversion in unknown record types." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-07T10:00:00", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-25/" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-23/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0131", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in the SpreadSheet Lotus 123 reader (wkssr.dll), as used in Autonomy KeyView 10.4 and 10.9, Symantec Mail Security, and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to floating point conversion in unknown record types." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "http://secunia.com/secunia_research/2010-25/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-25/" }, { "name": "41928", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41928" }, { "name": "http://secunia.com/secunia_research/2010-23/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-23/" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0131", "datePublished": "2010-08-17T17:31:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:53.861Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5909 (GCVE-0-2007-5909)
Vulnerability from cvelistv5
Published
2007-11-10 02:00
Modified
2024-08-07 15:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:47:00.550Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "3357", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3357" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-059.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111" }, { "name": "1018853", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018853" }, { "name": "20071023 [vuln.sg] IBM Lotus Notes Attachment Viewer Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/482664" }, { "name": "ADV-2007-3697", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3697" }, { "name": "26175", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26175" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://vuln.sg/lotusnotes702sam-en.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://vuln.sg/lotusnotes702mif-en.html" }, { "name": "20071031 ZDI-07-059: Verity KeyView SDK Multiple File Format Parsing Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/483102/100/0/threaded" }, { "name": "27304", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27304" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21272836" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://vuln.sg/lotusnotes702-en.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html" }, { "name": "1018886", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018886" }, { "name": "ADV-2007-3596", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3596" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://vuln.sg/lotusnotes702doc-en.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-15T20:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "3357", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3357" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-059.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111" }, { "name": "1018853", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018853" }, { "name": "20071023 [vuln.sg] IBM Lotus Notes Attachment Viewer Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/482664" }, { "name": "ADV-2007-3697", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3697" }, { "name": "26175", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26175" }, { "tags": [ "x_refsource_MISC" ], "url": "http://vuln.sg/lotusnotes702sam-en.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://vuln.sg/lotusnotes702mif-en.html" }, { "name": "20071031 ZDI-07-059: Verity KeyView SDK Multiple File Format Parsing Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/483102/100/0/threaded" }, { "name": "27304", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27304" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21272836" }, { "tags": [ "x_refsource_MISC" ], "url": "http://vuln.sg/lotusnotes702-en.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html" }, { "name": "1018886", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018886" }, { "name": "ADV-2007-3596", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3596" }, { "tags": [ "x_refsource_MISC" ], "url": "http://vuln.sg/lotusnotes702doc-en.html" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5909", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "3357", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3357" }, { "name": "http://www.zerodayinitiative.com/advisories/ZDI-07-059.html", "refsource": "MISC", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-059.html" }, { "name": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111" }, { "name": "1018853", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018853" }, { "name": "20071023 [vuln.sg] IBM Lotus Notes Attachment Viewer Buffer Overflow Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/482664" }, { "name": "ADV-2007-3697", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3697" }, { "name": "26175", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26175" }, { "name": "http://vuln.sg/lotusnotes702sam-en.html", "refsource": "MISC", "url": "http://vuln.sg/lotusnotes702sam-en.html" }, { "name": "http://vuln.sg/lotusnotes702mif-en.html", "refsource": "MISC", "url": "http://vuln.sg/lotusnotes702mif-en.html" }, { "name": "20071031 ZDI-07-059: Verity KeyView SDK Multiple File Format Parsing Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/483102/100/0/threaded" }, { "name": "27304", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27304" }, { "name": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21272836", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21272836" }, { "name": "http://vuln.sg/lotusnotes702-en.html", "refsource": "MISC", "url": "http://vuln.sg/lotusnotes702-en.html" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html" }, { "name": "1018886", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018886" }, { "name": "ADV-2007-3596", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3596" }, { "name": "http://vuln.sg/lotusnotes702doc-en.html", "refsource": "MISC", "url": "http://vuln.sg/lotusnotes702doc-en.html" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5909", "datePublished": "2007-11-10T02:00:00", "dateReserved": "2007-11-09T00:00:00", "dateUpdated": "2024-08-07T15:47:00.550Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1524 (GCVE-0-2010-1524)
Vulnerability from cvelistv5
Published
2010-08-17 17:31
Modified
2024-08-07 01:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
The SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via unspecified vectors related to allocation of an array of pointers and "string indexing," which triggers memory corruption.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:41.958Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-35/" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "The SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via unspecified vectors related to allocation of an array of pointers and \"string indexing,\" which triggers memory corruption." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-07T10:00:00", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-35/" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-1524", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via unspecified vectors related to allocation of an array of pointers and \"string indexing,\" which triggers memory corruption." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "http://secunia.com/secunia_research/2010-35/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-35/" }, { "name": "41928", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41928" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-1524", "datePublished": "2010-08-17T17:31:00", "dateReserved": "2010-04-26T00:00:00", "dateUpdated": "2024-08-07T01:28:41.958Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2618 (GCVE-0-2005-2618)
Vulnerability from cvelistv5
Published
2006-02-15 00:00
Modified
2024-08-07 22:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allow remote attackers to execute arbitrary code via (1) a UUE file containing an encoded file with a long filename handled by uudrdr.dll, (2) a compressed ZIP file with a long filename handled by kvarcve.dll, (3) a TAR archive with a long filename that is extracted to a directory with a long path handled by the TAR reader (tarrdr.dll), (4) an email that contains a long HTTP, FTP, or // link handled by the HTML speed reader (htmsr.dll) or (5) an email containing a crafted long link handled by the HTML speed reader (htmsr.dll).
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:30:02.167Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "lotus-kvarcve-filename-bo(24635)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24635" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-34/advisory/" }, { "name": "23067", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23067" }, { "name": "lotus-uudrdr-uue-bo(24636)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24636" }, { "name": "ADV-2006-0500", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0500" }, { "name": "ADV-2006-0501", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0501" }, { "name": "20060210 Secunia Research: Lotus Notes ZIP File Handling Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/424626/100/0/threaded" }, { "name": "23064", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23064" }, { "name": "23066", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23066" }, { "name": "1015657", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015657" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-36/advisory/" }, { "name": "23065", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23065" }, { "name": "16576", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16576" }, { "name": "20060210 Secunia Research: Lotus Notes UUE File Handling Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/424689/100/0/threaded" }, { "name": "16100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16100" }, { "name": "lotus-htmsr-link-bo(24639)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24639" }, { "name": "lotus-tarrdr-filename-bo(24638)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24638" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-32/advisory/" }, { "name": "VU#884076", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/884076" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-66/advisory/" }, { "name": "20060210 Secunia Research: Lotus Notes HTML Speed Reader Link BufferOverflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/424692/100/0/threaded" }, { "name": "16280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16280" }, { "name": "23068", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23068" }, { "name": "20060210 Secunia Research: Lotus Notes TAR Reader File Extraction BufferOverflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/424666/100/0/threaded" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-37/advisory/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-02-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allow remote attackers to execute arbitrary code via (1) a UUE file containing an encoded file with a long filename handled by uudrdr.dll, (2) a compressed ZIP file with a long filename handled by kvarcve.dll, (3) a TAR archive with a long filename that is extracted to a directory with a long path handled by the TAR reader (tarrdr.dll), (4) an email that contains a long HTTP, FTP, or // link handled by the HTML speed reader (htmsr.dll) or (5) an email containing a crafted long link handled by the HTML speed reader (htmsr.dll)." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "lotus-kvarcve-filename-bo(24635)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24635" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-34/advisory/" }, { "name": "23067", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23067" }, { "name": "lotus-uudrdr-uue-bo(24636)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24636" }, { "name": "ADV-2006-0500", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0500" }, { "name": "ADV-2006-0501", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0501" }, { "name": "20060210 Secunia Research: Lotus Notes ZIP File Handling Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/424626/100/0/threaded" }, { "name": "23064", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23064" }, { "name": "23066", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23066" }, { "name": "1015657", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015657" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-36/advisory/" }, { "name": "23065", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23065" }, { "name": "16576", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16576" }, { "name": "20060210 Secunia Research: Lotus Notes UUE File Handling Buffer Overflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/424689/100/0/threaded" }, { "name": "16100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16100" }, { "name": "lotus-htmsr-link-bo(24639)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24639" }, { "name": "lotus-tarrdr-filename-bo(24638)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24638" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-32/advisory/" }, { "name": "VU#884076", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/884076" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-66/advisory/" }, { "name": "20060210 Secunia Research: Lotus Notes HTML Speed Reader Link BufferOverflows", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/424692/100/0/threaded" }, { "name": "16280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16280" }, { "name": "23068", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23068" }, { "name": "20060210 Secunia Research: Lotus Notes TAR Reader File Extraction BufferOverflow", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/424666/100/0/threaded" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-37/advisory/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2618", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allow remote attackers to execute arbitrary code via (1) a UUE file containing an encoded file with a long filename handled by uudrdr.dll, (2) a compressed ZIP file with a long filename handled by kvarcve.dll, (3) a TAR archive with a long filename that is extracted to a directory with a long path handled by the TAR reader (tarrdr.dll), (4) an email that contains a long HTTP, FTP, or // link handled by the HTML speed reader (htmsr.dll) or (5) an email containing a crafted long link handled by the HTML speed reader (htmsr.dll)." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "lotus-kvarcve-filename-bo(24635)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24635" }, { "name": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918" }, { "name": "http://secunia.com/secunia_research/2005-34/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-34/advisory/" }, { "name": "23067", "refsource": "OSVDB", "url": "http://www.osvdb.org/23067" }, { "name": "lotus-uudrdr-uue-bo(24636)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24636" }, { "name": "ADV-2006-0500", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0500" }, { "name": "ADV-2006-0501", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0501" }, { "name": "20060210 Secunia Research: Lotus Notes ZIP File Handling Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/424626/100/0/threaded" }, { "name": "23064", "refsource": "OSVDB", "url": "http://www.osvdb.org/23064" }, { "name": "23066", "refsource": "OSVDB", "url": "http://www.osvdb.org/23066" }, { "name": "1015657", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015657" }, { "name": "http://secunia.com/secunia_research/2005-36/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-36/advisory/" }, { "name": "23065", "refsource": "OSVDB", "url": "http://www.osvdb.org/23065" }, { "name": "16576", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16576" }, { "name": "20060210 Secunia Research: Lotus Notes UUE File Handling Buffer Overflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/424689/100/0/threaded" }, { "name": "16100", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16100" }, { "name": "lotus-htmsr-link-bo(24639)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24639" }, { "name": "lotus-tarrdr-filename-bo(24638)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24638" }, { "name": "http://secunia.com/secunia_research/2005-32/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-32/advisory/" }, { "name": "VU#884076", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/884076" }, { "name": "http://secunia.com/secunia_research/2005-66/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-66/advisory/" }, { "name": "20060210 Secunia Research: Lotus Notes HTML Speed Reader Link BufferOverflows", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/424692/100/0/threaded" }, { "name": "16280", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16280" }, { "name": "23068", "refsource": "OSVDB", "url": "http://www.osvdb.org/23068" }, { "name": "20060210 Secunia Research: Lotus Notes TAR Reader File Extraction BufferOverflow", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/424666/100/0/threaded" }, { "name": "http://secunia.com/secunia_research/2005-37/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-37/advisory/" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2618", "datePublished": "2006-02-15T00:00:00", "dateReserved": "2005-08-17T00:00:00", "dateUpdated": "2024-08-07T22:30:02.167Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0134 (GCVE-0-2010-0134)
Vulnerability from cvelistv5
Published
2010-08-17 17:31
Modified
2024-08-07 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer signedness error in rtfsr.dll in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted \ls keyword in a list override table entry in an RTF file, which triggers a buffer overflow.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:53.906Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-27/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer signedness error in rtfsr.dll in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted \\ls keyword in a list override table entry in an RTF file, which triggers a buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-07T10:00:00", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-27/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0134", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer signedness error in rtfsr.dll in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted \\ls keyword in a list override table entry in an RTF file, which triggers a buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41928" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "name": "http://secunia.com/secunia_research/2010-27/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-27/" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0134", "datePublished": "2010-08-17T17:31:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:53.906Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-1525 (GCVE-0-2010-1525)
Vulnerability from cvelistv5
Published
2010-08-17 17:31
Modified
2024-08-07 01:28
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Integer underflow in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted size for an unspecified record type, which triggers a heap-based buffer overflow.
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T01:28:41.829Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-49/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Integer underflow in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted size for an unspecified record type, which triggers a heap-based buffer overflow." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-07T10:00:00", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-49/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-1525", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Integer underflow in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted size for an unspecified record type, which triggers a heap-based buffer overflow." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41928" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "name": "http://secunia.com/secunia_research/2010-49/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-49/" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-1525", "datePublished": "2010-08-17T17:31:00", "dateReserved": "2010-04-26T00:00:00", "dateUpdated": "2024-08-07T01:28:41.829Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2005-2619 (GCVE-0-2005-2619)
Vulnerability from cvelistv5
Published
2006-02-15 00:00
Modified
2024-08-07 22:30
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Directory traversal vulnerability in kvarcve.dll in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allows remote attackers to delete arbitrary files via a (1) ZIP, (2) UUE or (3) TAR archive that contains a .. (dot dot) in the filename, which is not properly handled when generating a preview.
References
► | URL | Tags | |||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T22:30:01.806Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918" }, { "name": "ADV-2006-0500", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2006/0500" }, { "name": "23066", "tags": [ "vdb-entry", "x_refsource_OSVDB", "x_transferred" ], "url": "http://www.osvdb.org/23066" }, { "name": "20060210 Secunia Research: Lotus Notes Multiple Archive Handling DirectoryTraversal", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/424717/100/0/threaded" }, { "name": "1015657", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1015657" }, { "name": "16576", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/16576" }, { "name": "lotus-kvarcve-directory-traversal(24637)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24637" }, { "name": "16100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16100" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-30/advisory/" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2005-66/advisory/" }, { "name": "16280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/16280" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2006-02-10T00:00:00", "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in kvarcve.dll in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allows remote attackers to delete arbitrary files via a (1) ZIP, (2) UUE or (3) TAR archive that contains a .. (dot dot) in the filename, which is not properly handled when generating a preview." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2018-10-19T14:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918" }, { "name": "ADV-2006-0500", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2006/0500" }, { "name": "23066", "tags": [ "vdb-entry", "x_refsource_OSVDB" ], "url": "http://www.osvdb.org/23066" }, { "name": "20060210 Secunia Research: Lotus Notes Multiple Archive Handling DirectoryTraversal", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/424717/100/0/threaded" }, { "name": "1015657", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1015657" }, { "name": "16576", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/16576" }, { "name": "lotus-kvarcve-directory-traversal(24637)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24637" }, { "name": "16100", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16100" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-30/advisory/" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2005-66/advisory/" }, { "name": "16280", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/16280" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2005-2619", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Directory traversal vulnerability in kvarcve.dll in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allows remote attackers to delete arbitrary files via a (1) ZIP, (2) UUE or (3) TAR archive that contains a .. (dot dot) in the filename, which is not properly handled when generating a preview." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918" }, { "name": "ADV-2006-0500", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2006/0500" }, { "name": "23066", "refsource": "OSVDB", "url": "http://www.osvdb.org/23066" }, { "name": "20060210 Secunia Research: Lotus Notes Multiple Archive Handling DirectoryTraversal", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/424717/100/0/threaded" }, { "name": "1015657", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1015657" }, { "name": "16576", "refsource": "BID", "url": "http://www.securityfocus.com/bid/16576" }, { "name": "lotus-kvarcve-directory-traversal(24637)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24637" }, { "name": "16100", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16100" }, { "name": "http://secunia.com/secunia_research/2005-30/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-30/advisory/" }, { "name": "http://secunia.com/secunia_research/2005-66/advisory/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2005-66/advisory/" }, { "name": "16280", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/16280" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2005-2619", "datePublished": "2006-02-15T00:00:00", "dateReserved": "2005-08-17T00:00:00", "dateUpdated": "2024-08-07T22:30:01.806Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0135 (GCVE-0-2010-0135)
Vulnerability from cvelistv5
Published
2010-08-17 17:31
Modified
2024-08-07 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Heap-based buffer overflow in the WordPerfect 5.x reader (wosr.dll), as used in Autonomy KeyView 10.4 and 10.9 and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to "data blocks."
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:53.870Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-31/" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the WordPerfect 5.x reader (wosr.dll), as used in Autonomy KeyView 10.4 and 10.9 and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to \"data blocks.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-07T10:00:00", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-31/" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0135", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Heap-based buffer overflow in the WordPerfect 5.x reader (wosr.dll), as used in Autonomy KeyView 10.4 and 10.9 and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to \"data blocks.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41928" }, { "name": "http://secunia.com/secunia_research/2010-31/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-31/" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0135", "datePublished": "2010-08-17T17:31:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:53.870Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2010-0133 (GCVE-0-2010-0133)
Vulnerability from cvelistv5
Published
2010-08-17 17:31
Modified
2024-08-07 00:37
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Multiple stack-based buffer overflows in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allow remote attackers to execute arbitrary code via unspecified vectors related to "certain records."
References
► | URL | Tags | ||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T00:37:54.083Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://secunia.com/secunia_research/2010-28/" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2010-07-28T00:00:00", "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allow remote attackers to execute arbitrary code via unspecified vectors related to \"certain records.\"" } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2013-02-07T10:00:00", "orgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "shortName": "flexera" }, "references": [ { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/41928" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "tags": [ "x_refsource_MISC" ], "url": "http://secunia.com/secunia_research/2010-28/" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "PSIRT-CNA@flexerasoftware.com", "ID": "CVE-2010-0133", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Multiple stack-based buffer overflows in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allow remote attackers to execute arbitrary code via unspecified vectors related to \"certain records.\"" } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01", "refsource": "CONFIRM", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "name": "41928", "refsource": "BID", "url": "http://www.securityfocus.com/bid/41928" }, { "name": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812", "refsource": "CONFIRM", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "name": "http://secunia.com/secunia_research/2010-28/", "refsource": "MISC", "url": "http://secunia.com/secunia_research/2010-28/" } ] } } } }, "cveMetadata": { "assignerOrgId": "44d08088-2bea-4760-83a6-1e9be26b15ab", "assignerShortName": "flexera", "cveId": "CVE-2010-0133", "datePublished": "2010-08-17T17:31:00", "dateReserved": "2010-01-04T00:00:00", "dateUpdated": "2024-08-07T00:37:54.083Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
CVE-2007-5910 (GCVE-0-2007-5910)
Vulnerability from cvelistv5
Published
2007-11-10 02:00
Modified
2024-08-07 15:47
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- n/a
Summary
Stack-based buffer overflow in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, wp6sr.dll in IBM Lotus Notes 8.0 and before 7.0.3, Symantec Mail Security, and other products, allows remote attackers to execute arbitrary code via a crafted WordPerfect (WPD) file.
References
► | URL | Tags | ||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-07T15:47:00.587Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://vuln.sg/lotusnotes702wpd-en.html" }, { "name": "3357", "tags": [ "third-party-advisory", "x_refsource_SREASON", "x_transferred" ], "url": "http://securityreason.com/securityalert/3357" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111" }, { "name": "1018853", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018853" }, { "name": "20071023 [vuln.sg] IBM Lotus Notes Attachment Viewer Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://www.securityfocus.com/archive/1/482664" }, { "name": "ADV-2007-3697", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3697" }, { "name": "26175", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/26175" }, { "name": "27304", "tags": [ "third-party-advisory", "x_refsource_SECUNIA", "x_transferred" ], "url": "http://secunia.com/advisories/27304" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://vuln.sg/lotusnotes702-en.html" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html" }, { "name": "1018886", "tags": [ "vdb-entry", "x_refsource_SECTRACK", "x_transferred" ], "url": "http://securitytracker.com/id?1018886" }, { "name": "ADV-2007-3596", "tags": [ "vdb-entry", "x_refsource_VUPEN", "x_transferred" ], "url": "http://www.vupen.com/english/advisories/2007/3596" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2007-10-23T00:00:00", "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, wp6sr.dll in IBM Lotus Notes 8.0 and before 7.0.3, Symantec Mail Security, and other products, allows remote attackers to execute arbitrary code via a crafted WordPerfect (WPD) file." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2007-11-28T10:00:00", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://vuln.sg/lotusnotes702wpd-en.html" }, { "name": "3357", "tags": [ "third-party-advisory", "x_refsource_SREASON" ], "url": "http://securityreason.com/securityalert/3357" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111" }, { "name": "1018853", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018853" }, { "name": "20071023 [vuln.sg] IBM Lotus Notes Attachment Viewer Buffer Overflow Vulnerabilities", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://www.securityfocus.com/archive/1/482664" }, { "name": "ADV-2007-3697", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3697" }, { "name": "26175", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/26175" }, { "name": "27304", "tags": [ "third-party-advisory", "x_refsource_SECUNIA" ], "url": "http://secunia.com/advisories/27304" }, { "tags": [ "x_refsource_MISC" ], "url": "http://vuln.sg/lotusnotes702-en.html" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html" }, { "name": "1018886", "tags": [ "vdb-entry", "x_refsource_SECTRACK" ], "url": "http://securitytracker.com/id?1018886" }, { "name": "ADV-2007-3596", "tags": [ "vdb-entry", "x_refsource_VUPEN" ], "url": "http://www.vupen.com/english/advisories/2007/3596" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2007-5910", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "Stack-based buffer overflow in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, wp6sr.dll in IBM Lotus Notes 8.0 and before 7.0.3, Symantec Mail Security, and other products, allows remote attackers to execute arbitrary code via a crafted WordPerfect (WPD) file." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "http://vuln.sg/lotusnotes702wpd-en.html", "refsource": "MISC", "url": "http://vuln.sg/lotusnotes702wpd-en.html" }, { "name": "3357", "refsource": "SREASON", "url": "http://securityreason.com/securityalert/3357" }, { "name": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111", "refsource": "CONFIRM", "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111" }, { "name": "1018853", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018853" }, { "name": "20071023 [vuln.sg] IBM Lotus Notes Attachment Viewer Buffer Overflow Vulnerabilities", "refsource": "BUGTRAQ", "url": "http://www.securityfocus.com/archive/1/482664" }, { "name": "ADV-2007-3697", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3697" }, { "name": "26175", "refsource": "BID", "url": "http://www.securityfocus.com/bid/26175" }, { "name": "27304", "refsource": "SECUNIA", "url": "http://secunia.com/advisories/27304" }, { "name": "http://vuln.sg/lotusnotes702-en.html", "refsource": "MISC", "url": "http://vuln.sg/lotusnotes702-en.html" }, { "name": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html", "refsource": "CONFIRM", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html" }, { "name": "1018886", "refsource": "SECTRACK", "url": "http://securitytracker.com/id?1018886" }, { "name": "ADV-2007-3596", "refsource": "VUPEN", "url": "http://www.vupen.com/english/advisories/2007/3596" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2007-5910", "datePublished": "2007-11-10T02:00:00", "dateReserved": "2007-11-09T00:00:00", "dateUpdated": "2024-08-07T15:47:00.587Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1" }
Vulnerability from fkie_nvd
Published
2010-08-17 20:00
Modified
2025-04-11 00:51
Severity ?
Summary
The SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via unspecified vectors related to allocation of an array of pointers and "string indexing," which triggers memory corruption.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-35/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/41928 | ||
PSIRT-CNA@flexerasoftware.com | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-35/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41928 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autonomy | keyview_export_sdk | 10.4 | |
autonomy | keyview_export_sdk | 10.9 | |
autonomy | keyview_filter_sdk | 10.4 | |
autonomy | keyview_filter_sdk | 10.9 | |
autonomy | keyview_viewer_sdk | 10.4 | |
autonomy | keyview_viewer_sdk | 10.9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "F588C397-FB3F-4A04-A015-B6F6D9C3B994", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "C456319D-6699-4970-A146-6E52DD285D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "C558D1E3-4C6B-4C00-A415-5B9E343073D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "706571F3-D347-4760-A55B-4F465DAFCBFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "4056FDC9-27A4-41D9-9C84-B50A66F30161", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "73ECC62B-CED2-4401-A2F7-8E714D20D111", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "The SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via unspecified vectors related to allocation of an array of pointers and \"string indexing,\" which triggers memory corruption." }, { "lang": "es", "value": "El lector SpreadSheet Lotus 123 (wkssr.dll) en Autonomy KeyView v10.4 y v10.9, como el usado en IBM, Symantec, y otros productos, permite a los atacantes remotos ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de vectores no especificados relacionados con la asignaci\u00f3n de una matriz de punteros y \"cadena de indexaci\u00f3n\" lo cual provoca una corrupci\u00f3n de memoria." } ], "id": "CVE-2010-1524", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-17T20:00:03.000", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-35/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-35/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-17 20:00
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in the WordPerfect 5.x reader (wosr.dll), as used in Autonomy KeyView 10.4 and 10.9 and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to "data blocks."
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-31/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/41928 | ||
PSIRT-CNA@flexerasoftware.com | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-31/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41928 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autonomy | keyview_export_sdk | 10.4 | |
autonomy | keyview_export_sdk | 10.9 | |
autonomy | keyview_filter_sdk | 10.4 | |
autonomy | keyview_filter_sdk | 10.9 | |
autonomy | keyview_viewer_sdk | 10.4 | |
autonomy | keyview_viewer_sdk | 10.9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "F588C397-FB3F-4A04-A015-B6F6D9C3B994", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "C456319D-6699-4970-A146-6E52DD285D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "C558D1E3-4C6B-4C00-A415-5B9E343073D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "706571F3-D347-4760-A55B-4F465DAFCBFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "4056FDC9-27A4-41D9-9C84-B50A66F30161", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "73ECC62B-CED2-4401-A2F7-8E714D20D111", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in the WordPerfect 5.x reader (wosr.dll), as used in Autonomy KeyView 10.4 and 10.9 and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to \"data blocks.\"" }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en la memoria din\u00e1mica en el lector de WordPerfect v5.x (wosr.dll), como el usado en Autonomy KeyView v10.4 y v10.9 y posiblemente otros productos, permite a atacantes remotos ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de vectores no especificados relacionados con \"bloques de dartos\"." } ], "id": "CVE-2010-0135", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-17T20:00:02.893", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-31/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-31/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-10 02:46
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, wp6sr.dll in IBM Lotus Notes 8.0 and before 7.0.3, Symantec Mail Security, and other products, allows remote attackers to execute arbitrary code via a crafted WordPerfect (WPD) file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/27304 | Patch, Vendor Advisory | |
cve@mitre.org | http://securityreason.com/securityalert/3357 | ||
cve@mitre.org | http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html | ||
cve@mitre.org | http://securitytracker.com/id?1018853 | ||
cve@mitre.org | http://securitytracker.com/id?1018886 | ||
cve@mitre.org | http://vuln.sg/lotusnotes702-en.html | ||
cve@mitre.org | http://vuln.sg/lotusnotes702wpd-en.html | ||
cve@mitre.org | http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21271111 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/482664 | ||
cve@mitre.org | http://www.securityfocus.com/bid/26175 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3596 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3697 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27304 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/3357 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1018853 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1018886 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://vuln.sg/lotusnotes702-en.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://vuln.sg/lotusnotes702wpd-en.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21271111 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/482664 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/26175 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3596 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3697 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
activepdf | docconverter | 3.8.2_.5 | |
autonomy | keyview_export_sdk | * | |
autonomy | keyview_filter_sdk | * | |
autonomy | keyview_viewer_sdk | * | |
ibm | lotus_notes | * | |
symantec | mail_security | 5.0 | |
symantec | mail_security | 5.0 | |
symantec | mail_security | 5.0.0 | |
symantec | mail_security | 5.0.0.24 | |
symantec | mail_security | 5.0.1 | |
symantec | mail_security | 7.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:activepdf:docconverter:3.8.2_.5:*:*:*:*:*:*:*", "matchCriteriaId": "0D165E31-F294-4F7E-959F-7AFE69AF90A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "872E3116-26DC-492D-94EA-7BE531299FF8", "versionEndIncluding": "9.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "07FFE40A-6A96-4131-B537-8A4D8C1494AD", "versionEndIncluding": "9.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9E88061-F0E3-4CA9-8FCE-4B69FE4F3844", "versionEndIncluding": "9.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*", "matchCriteriaId": "F61B72CC-BC8D-40AF-AE72-5A6EEFB53B10", "versionEndIncluding": "7.0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*", "matchCriteriaId": "0648861C-A58E-4103-8720-4480C2F098FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "9608BF57-0D9A-4874-BFDA-C92447FACD70", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*", "matchCriteriaId": "5E7788BD-652E-4306-AED0-6AE7F9A07836", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*", "matchCriteriaId": "977786AB-A76C-4A1C-8999-BF4A5E08F8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*", "matchCriteriaId": "A8430D5E-A8A7-4724-8A6B-B5E2CA437729", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:7.5:*:domino:*:*:*:*:*", "matchCriteriaId": "7D29BE63-3E26-4136-BAB1-AA3D50BA71F5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, wp6sr.dll in IBM Lotus Notes 8.0 and before 7.0.3, Symantec Mail Security, and other products, allows remote attackers to execute arbitrary code via a crafted WordPerfect (WPD) file." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el Autonomy (antiguamente Verity) KeyView Viewer, en el Filter y en el Export SDK anterior al 9.2.0.12, como el utilizado en el ActivePDF DocConverter, en el wp6sr.dll del IBM Lotus Notes 8.0 y anteriores al 7.0.3, en el Symantec Mail Security y en otros productos, permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de un fichero modificado de WordPerfect (WPD)." } ], "id": "CVE-2007-5910", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-11-10T02:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27304" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3357" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018853" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018886" }, { "source": "cve@mitre.org", "url": "http://vuln.sg/lotusnotes702-en.html" }, { "source": "cve@mitre.org", "url": "http://vuln.sg/lotusnotes702wpd-en.html" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/482664" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/26175" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3596" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3697" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://vuln.sg/lotusnotes702-en.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://vuln.sg/lotusnotes702wpd-en.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/482664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/26175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3697" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2009-03-18 15:30
Modified
2025-04-09 00:30
Severity ?
Summary
Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774 | ||
cve@mitre.org | http://osvdb.org/52713 | ||
cve@mitre.org | http://secunia.com/advisories/34303 | ||
cve@mitre.org | http://secunia.com/advisories/34307 | Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/34318 | ||
cve@mitre.org | http://secunia.com/advisories/34355 | ||
cve@mitre.org | http://securitytracker.com/id?1021856 | ||
cve@mitre.org | http://securitytracker.com/id?1021857 | ||
cve@mitre.org | http://www-01.ibm.com/support/docview.wss?rs=463&uid=swg21377573 | Vendor Advisory | |
cve@mitre.org | http://www.kb.cert.org/vuls/id/276563 | US Government Resource | |
cve@mitre.org | http://www.securityfocus.com/bid/34086 | ||
cve@mitre.org | http://www.securitytracker.com/id?1021859 | ||
cve@mitre.org | http://www.symantec.com/avcenter/security/Content/2009.03.17a.html | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/0744 | Vendor Advisory | |
cve@mitre.org | http://www.vupen.com/english/advisories/2009/0756 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2009/0757 | ||
cve@mitre.org | https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/49284 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://osvdb.org/52713 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34303 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34307 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34318 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/34355 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1021856 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1021857 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?rs=463&uid=swg21377573 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/276563 | US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/34086 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1021859 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.symantec.com/avcenter/security/Content/2009.03.17a.html | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0744 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0756 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2009/0757 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/49284 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autonomy | keyview_export_sdk | * | |
autonomy | keyview_export_sdk | 2.0 | |
autonomy | keyview_export_sdk | 9.2.0 | |
autonomy | keyview_export_sdk | 10 | |
autonomy | keyview_export_sdk | 10.3 | |
autonomy | keyview_filter_sdk | * | |
autonomy | keyview_filter_sdk | 2.0 | |
autonomy | keyview_filter_sdk | 9.2.0 | |
autonomy | keyview_filter_sdk | 10 | |
autonomy | keyview_filter_sdk | 10.3 | |
autonomy | keyview_viewer_sdk | * | |
autonomy | keyview_viewer_sdk | 2.0 | |
autonomy | keyview_viewer_sdk | 9.2.0 | |
autonomy | keyview_viewer_sdk | 10 | |
autonomy | keyview_viewer_sdk | 10.3 | |
ibm | lotus_notes | 5.0.3 | |
ibm | lotus_notes | 5.0.12 | |
ibm | lotus_notes | 6.0 | |
ibm | lotus_notes | 6.0.1 | |
ibm | lotus_notes | 6.0.2 | |
ibm | lotus_notes | 6.0.3 | |
ibm | lotus_notes | 6.0.4 | |
ibm | lotus_notes | 6.0.5 | |
ibm | lotus_notes | 6.5 | |
ibm | lotus_notes | 6.5.1 | |
ibm | lotus_notes | 6.5.2 | |
ibm | lotus_notes | 6.5.3 | |
ibm | lotus_notes | 6.5.4 | |
ibm | lotus_notes | 6.5.5 | |
ibm | lotus_notes | 6.5.5 | |
ibm | lotus_notes | 6.5.5 | |
ibm | lotus_notes | 6.5.6 | |
ibm | lotus_notes | 6.5.6 | |
ibm | lotus_notes | 7.0 | |
ibm | lotus_notes | 7.0.1 | |
ibm | lotus_notes | 7.0.2 | |
ibm | lotus_notes | 7.0.2 | |
ibm | lotus_notes | 7.0.3 | |
ibm | lotus_notes | 8.0 | |
symantec | altiris_deployment_solution | * | |
symantec | brightmail | 5.0 | |
symantec | data_loss_prevention_detection_servers | 7.0 | |
symantec | data_loss_prevention_detection_servers | 8.0 | |
symantec | data_loss_prevention_detection_servers | 8.1 | |
symantec | data_loss_prevention_detection_servers | 8.1 | |
symantec | data_loss_prevention_endpoint_agents | 8.0 | |
symantec | data_loss_prevention_endpoint_agents | 8.1 | |
symantec | enforce | 7.0 | |
symantec | enforce | 8.0 | |
symantec | enforce | 8.1 | |
symantec | enforce | 8.1 | |
symantec | mail_security | 5.0 | |
symantec | mail_security | 5.0.0 | |
symantec | mail_security | 5.0.0 | |
symantec | mail_security | 5.0.0.24 | |
symantec | mail_security | 5.0.1 | |
symantec | mail_security | 5.0.1.181 | |
symantec | mail_security | 5.0.1.182 | |
symantec | mail_security | 5.0.1.189 | |
symantec | mail_security | 5.0.1.200 | |
symantec | mail_security | 5.0.10 | |
symantec | mail_security | 5.0.11 | |
symantec | mail_security | 6.0.6 | |
symantec | mail_security | 6.0.7 | |
symantec | mail_security | 7.5..4.29 | |
symantec | mail_security | 7.5.3.25 | |
symantec | mail_security | 7.5.5.32 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "6B16D7CE-3770-46A6-BECA-76989E9639BE", "versionEndIncluding": "10.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "6DB3799E-43FC-40AA-85EC-72D87962C95D", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:9.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B92810D7-A5C2-4118-8B67-9E1A49C6C4D2", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10:*:*:*:*:*:*:*", "matchCriteriaId": "893D0CC9-971E-4C78-AD80-D004D8BB5F37", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "15B8E1D9-ADF9-40B2-A652-53CDEF60FAB5", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "177E8A5C-0812-47BC-9CFC-F8E25A0F42AB", "versionEndIncluding": "10.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8E3B7CC-48D2-4EB0-A0D9-44AA6947CF65", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:9.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B90F221E-6C5A-4844-A098-53BE40E78A40", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10:*:*:*:*:*:*:*", "matchCriteriaId": "E4F4A68C-EF5D-41BB-A518-D277927D80D3", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "EC6E0041-6647-4B04-B4C1-019E1F12E606", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "BD370EEA-A33C-45B2-8FC6-C419AD6468E4", "versionEndIncluding": "10.4", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:2.0:*:*:*:*:*:*:*", "matchCriteriaId": "2FE65E34-052C-4614-BA69-71D96EBC65E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:9.2.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8D56C0E-3403-4B91-A064-69E46770FBBF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10:*:*:*:*:*:*:*", "matchCriteriaId": "CBB6C6D0-0848-45D0-ACA7-03B46F42AE76", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.3:*:*:*:*:*:*:*", "matchCriteriaId": "3E50CAF0-1F3A-4F57-A8DA-91B7840BBE3F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:5.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "0D4B2601-B62F-4235-BFFD-281235737450", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:5.0.12:*:*:*:*:*:*:*", "matchCriteriaId": "273DF27B-9441-4925-BD7E-5709D7D059EE", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "1E234AD1-7202-421E-82C8-880E84876021", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D037CC-1207-48E2-882E-8B236EE7138F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5059BEF2-84EB-4B5F-84F5-9E3200B068F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB71B7AA-957B-46A6-9BC9-CE23EC721189", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "46CF28C0-51AD-4783-B1F0-205DF64D133A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C0015A2-A70E-4B0C-B59A-44F5F611293D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "1360A50E-C1E1-4690-874A-04CC7C1A77CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D94927A9-61FD-459F-9A6D-E581A4AF505C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D3B32BA2-9EB7-4294-A857-226A5B1CC401", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "EF64CA16-6C20-42E1-BA68-BD63A873BFA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "12D7DD7B-CA90-44A5-9B7B-4A4985150689", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.5:*:*:*:*:*:*:*", "matchCriteriaId": "C63D40DF-C6F3-4502-9816-939265F10532", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.5:*:fp2:*:*:*:*:*", "matchCriteriaId": "F8B5BF9A-F8A7-4C2B-B093-8226D0ED1425", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.5:*:fp3:*:*:*:*:*", "matchCriteriaId": "04CB50C2-2B01-4A68-BE96-1127B9954F38", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.6:*:*:*:*:*:*:*", "matchCriteriaId": "4598C4A8-B19D-4562-A5B5-D3B090F0C8D7", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.6:*:fp2:*:*:*:*:*", "matchCriteriaId": "66D334E1-9326-4D0A-8D87-572F3E6B44BD", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "68AEB13D-C7C6-426F-8484-85EFF7245DF5", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "94646433-DE15-4214-9C78-7D1DAB5A12D9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "3449A490-865A-4262-8482-429DEF455644", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:7.0.2:*:fp1:*:*:*:*:*", "matchCriteriaId": "5614CD60-7690-47E6-AEB3-FB0151EB264C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:7.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "F01C5CFC-7FB8-4D29-95AC-8EF59B0C170D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "692E295E-E650-42D5-AF7A-D6276C3D76E0", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:altiris_deployment_solution:*:*:*:*:*:*:*:*", "matchCriteriaId": "3D6701EB-AF87-4B63-A8B5-AA27C28DFFB1", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:brightmail:5.0:*:appliance:*:*:*:*:*", "matchCriteriaId": "E1BE16AC-118D-4BA0-AE37-3DB2E4E417DD", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:data_loss_prevention_detection_servers:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "1F945149-43CC-4EAC-9A78-C6A3BA6FAF9D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:data_loss_prevention_detection_servers:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "1D42BEF4-9BB4-4CCF-9395-C306C3CEBB0C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:data_loss_prevention_detection_servers:8.1:*:linux:*:*:*:*:*", "matchCriteriaId": "DC2C0DBF-382C-4F96-8497-2FABD7CB67C3", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:data_loss_prevention_detection_servers:8.1:*:windows:*:*:*:*:*", "matchCriteriaId": "42A91935-15AC-4F64-AD3D-EFAD08955562", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:data_loss_prevention_endpoint_agents:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "37076C05-12CE-484C-AB10-711BABFF6992", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:data_loss_prevention_endpoint_agents:8.1:*:*:*:*:*:*:*", "matchCriteriaId": "2A5F3BAC-B470-4FB7-88AF-47A33D46EF00", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:enforce:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "CFD0A99F-6B8A-4BB9-B8A7-40BB5D7B7CFB", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:enforce:8.0:*:*:*:*:*:*:*", "matchCriteriaId": "B8960720-5DF0-4F4C-9603-09A85FAF843D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:enforce:8.1:*:linux:*:*:*:*:*", "matchCriteriaId": "3E9D9CE3-109C-4035-9934-2B457268985D", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:enforce:8.1:*:windows:*:*:*:*:*", "matchCriteriaId": "E258E769-38CC-4E62-8158-3D549263ED1C", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*", "matchCriteriaId": "0648861C-A58E-4103-8720-4480C2F098FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0:*:*:*:*:*:*:*", "matchCriteriaId": "C890707A-D2DF-403A-87CB-2AB01E85D8B5", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*", "matchCriteriaId": "5E7788BD-652E-4306-AED0-6AE7F9A07836", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*", "matchCriteriaId": "977786AB-A76C-4A1C-8999-BF4A5E08F8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*", "matchCriteriaId": "A8430D5E-A8A7-4724-8A6B-B5E2CA437729", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1.181:*:smtp:*:*:*:*:*", "matchCriteriaId": "D602A441-863D-4E90-A01D-57C41725D008", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1.182:*:smtp:*:*:*:*:*", "matchCriteriaId": "A792A9C1-95EF-4CE2-B14F-3DEE09BFAF8A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1.189:*:smtp:*:*:*:*:*", "matchCriteriaId": "5D9C7B86-7F9A-4DF8-A4DF-9A7CA5991D91", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1.200:*:smtp:*:*:*:*:*", "matchCriteriaId": "0117D61C-DEE6-4803-9CF8-27EEBAA493CA", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.10:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "5BF163AF-E470-492A-940C-B2FB37AA2322", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.11:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "95D5B1CF-6C20-4D66-9D30-631441FA953B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:6.0.6:microsoft_exchange:*:*:*:*:*:*", "matchCriteriaId": "5BBAE476-DB98-4464-81DF-8EC386E808B4", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:6.0.7:microsoft_exchange:*:*:*:*:*:*", "matchCriteriaId": "225BA7A2-8C45-42F1-921B-105CF8F0F22A", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:7.5..4.29:*:domino:*:*:*:*:*", "matchCriteriaId": "B1E6B709-B44B-47AC-A7FF-0C248D777D5F", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:7.5.3.25:*:domino:*:*:*:*:*", "matchCriteriaId": "07FADB30-A418-43C5-A798-4769C5350E7B", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:7.5.5.32:*:domino:*:*:*:*:*", "matchCriteriaId": "70F1A708-9914-4875-B594-D8A9D65182D8", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en wp6sr.dll en el Autonomy KeyView SDK 10.4 y anteriores, como es usado en IBM Lotus Notes, productos Symantec Mail Security (SMS), productos Symantec BrightMail Appliance y productos Symantec Data Loss Prevention (DLP) permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante un fichero Word Perfect Document (WPD) manipulado." } ], "id": "CVE-2008-4564", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2009-03-18T15:30:00.267", "references": [ { "source": "cve@mitre.org", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774" }, { "source": "cve@mitre.org", "url": "http://osvdb.org/52713" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34303" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34307" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34318" }, { "source": "cve@mitre.org", "url": "http://secunia.com/advisories/34355" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1021856" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1021857" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?rs=463\u0026uid=swg21377573" }, { "source": "cve@mitre.org", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/276563" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/34086" }, { "source": "cve@mitre.org", "url": "http://www.securitytracker.com/id?1021859" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/avcenter/security/Content/2009.03.17a.html" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0744" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0756" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2009/0757" }, { "source": "cve@mitre.org", "url": "https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49284" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://osvdb.org/52713" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34303" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/advisories/34307" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34318" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://secunia.com/advisories/34355" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021856" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1021857" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www-01.ibm.com/support/docview.wss?rs=463\u0026uid=swg21377573" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/276563" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/34086" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securitytracker.com/id?1021859" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.symantec.com/avcenter/security/Content/2009.03.17a.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2009/0744" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0756" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2009/0757" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/49284" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-17 20:00
Modified
2025-04-11 00:51
Severity ?
Summary
Stack-based buffer overflow in the SpreadSheet Lotus 123 reader (wkssr.dll), as used in Autonomy KeyView 10.4 and 10.9, Symantec Mail Security, and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to floating point conversion in unknown record types.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-23/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-25/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/41928 | ||
PSIRT-CNA@flexerasoftware.com | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-23/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-25/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41928 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autonomy | keyview_export_sdk | 10.4 | |
autonomy | keyview_export_sdk | 10.9 | |
autonomy | keyview_filter_sdk | 10.4 | |
autonomy | keyview_filter_sdk | 10.9 | |
autonomy | keyview_viewer_sdk | 10.4 | |
autonomy | keyview_viewer_sdk | 10.9 | |
symantec | mail_security | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "F588C397-FB3F-4A04-A015-B6F6D9C3B994", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "C456319D-6699-4970-A146-6E52DD285D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "C558D1E3-4C6B-4C00-A415-5B9E343073D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "706571F3-D347-4760-A55B-4F465DAFCBFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "4056FDC9-27A4-41D9-9C84-B50A66F30161", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "73ECC62B-CED2-4401-A2F7-8E714D20D111", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:*:*:*:*:*:*:*:*", "matchCriteriaId": "24C40C7A-702F-4B72-A24B-385990EA6511", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Stack-based buffer overflow in the SpreadSheet Lotus 123 reader (wkssr.dll), as used in Autonomy KeyView 10.4 and 10.9, Symantec Mail Security, and possibly other products, allows remote attackers to execute arbitrary code via unspecified vectors related to floating point conversion in unknown record types." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en pila en el lector SpreadSheet Lotus 123 (wkssr.dll), como el usado en Autonomy KeyView v10.4 y v10.9, Symantec Mail Security, y posiblemente otros productos, permite a los atacantes remotos ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de vectores no especificados relacionados con conversi\u00f3n de coma flotante en tipos de registro desconocidos." } ], "id": "CVE-2010-0131", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-17T20:00:02.547", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-23/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-25/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-23/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-25/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allow remote attackers to execute arbitrary code via (1) a UUE file containing an encoded file with a long filename handled by uudrdr.dll, (2) a compressed ZIP file with a long filename handled by kvarcve.dll, (3) a TAR archive with a long filename that is extracted to a directory with a long path handled by the TAR reader (tarrdr.dll), (4) an email that contains a long HTTP, FTP, or // link handled by the HTML speed reader (htmsr.dll) or (5) an email containing a crafted long link handled by the HTML speed reader (htmsr.dll).
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/16100 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/16280 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/secunia_research/2005-32/advisory/ | Vendor Advisory | |
cve@mitre.org | http://secunia.com/secunia_research/2005-34/advisory/ | Vendor Advisory | |
cve@mitre.org | http://secunia.com/secunia_research/2005-36/advisory/ | Vendor Advisory | |
cve@mitre.org | http://secunia.com/secunia_research/2005-37/advisory/ | Vendor Advisory | |
cve@mitre.org | http://secunia.com/secunia_research/2005-66/advisory/ | Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1015657 | Patch | |
cve@mitre.org | http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918 | Patch | |
cve@mitre.org | http://www.kb.cert.org/vuls/id/884076 | Third Party Advisory, US Government Resource | |
cve@mitre.org | http://www.osvdb.org/23064 | Patch | |
cve@mitre.org | http://www.osvdb.org/23065 | Patch | |
cve@mitre.org | http://www.osvdb.org/23066 | Patch | |
cve@mitre.org | http://www.osvdb.org/23067 | Patch | |
cve@mitre.org | http://www.osvdb.org/23068 | Patch | |
cve@mitre.org | http://www.securityfocus.com/archive/1/424626/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/424666/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/424689/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/424692/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/16576 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/0500 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/0501 | Vendor Advisory | |
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24635 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24636 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24638 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24639 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/16100 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/16280 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2005-32/advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2005-34/advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2005-36/advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2005-37/advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2005-66/advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015657 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/884076 | Third Party Advisory, US Government Resource | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/23064 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/23065 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/23066 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/23067 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/23068 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/424626/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/424666/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/424689/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/424692/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/16576 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/0500 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/0501 | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24635 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24636 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24638 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24639 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autonomy | keyview_export_sdk | * | |
autonomy | keyview_filter_sdk | * | |
autonomy | keyview_viewer_sdk | * | |
ibm | lotus_notes | 6.0.1 | |
ibm | lotus_notes | 6.0.2 | |
ibm | lotus_notes | 6.0.3 | |
ibm | lotus_notes | 6.0.4 | |
ibm | lotus_notes | 6.0.5 | |
ibm | lotus_notes | 6.5 | |
ibm | lotus_notes | 6.5.1 | |
ibm | lotus_notes | 6.5.2 | |
ibm | lotus_notes | 6.5.3 | |
ibm | lotus_notes | 6.5.4 | |
ibm | lotus_notes | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4CD7AAC-E4E2-47E4-A34D-47C670FA6254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "754BD2C9-2100-4B21-B164-47487434D9E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B6DDCD8-B9AD-4757-A067-CF99372D7326", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D037CC-1207-48E2-882E-8B236EE7138F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5059BEF2-84EB-4B5F-84F5-9E3200B068F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB71B7AA-957B-46A6-9BC9-CE23EC721189", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "46CF28C0-51AD-4783-B1F0-205DF64D133A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C0015A2-A70E-4B0C-B59A-44F5F611293D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "1360A50E-C1E1-4690-874A-04CC7C1A77CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D94927A9-61FD-459F-9A6D-E581A4AF505C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D3B32BA2-9EB7-4294-A857-226A5B1CC401", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "EF64CA16-6C20-42E1-BA68-BD63A873BFA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "12D7DD7B-CA90-44A5-9B7B-4A4985150689", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "68AEB13D-C7C6-426F-8484-85EFF7245DF5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allow remote attackers to execute arbitrary code via (1) a UUE file containing an encoded file with a long filename handled by uudrdr.dll, (2) a compressed ZIP file with a long filename handled by kvarcve.dll, (3) a TAR archive with a long filename that is extracted to a directory with a long path handled by the TAR reader (tarrdr.dll), (4) an email that contains a long HTTP, FTP, or // link handled by the HTML speed reader (htmsr.dll) or (5) an email containing a crafted long link handled by the HTML speed reader (htmsr.dll)." } ], "id": "CVE-2005-2618", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16100" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16280" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-32/advisory/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-34/advisory/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-36/advisory/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-37/advisory/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-66/advisory/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015657" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918" }, { "source": "cve@mitre.org", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/884076" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23064" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23065" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23066" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23067" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23068" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/424626/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/424666/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/424689/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/424692/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16576" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0500" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/0501" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24635" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24636" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24638" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24639" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-32/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-34/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-36/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-37/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-66/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ], "url": "http://www.kb.cert.org/vuls/id/884076" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23064" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23065" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23067" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23068" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/424626/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/424666/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/424689/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/424692/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://www.vupen.com/english/advisories/2006/0501" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24635" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24636" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24638" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24639" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-17 20:00
Modified
2025-04-11 00:51
Severity ?
Summary
Heap-based buffer overflow in an unspecified library in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted compound file, as demonstrated using a Quattro Pro file, which is not properly handled by the Quattro speed reader (qpssr.dll).
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-16/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/41928 | ||
PSIRT-CNA@flexerasoftware.com | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-16/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41928 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autonomy | keyview_export_sdk | 10.4 | |
autonomy | keyview_export_sdk | 10.9 | |
autonomy | keyview_filter_sdk | 10.4 | |
autonomy | keyview_filter_sdk | 10.9 | |
autonomy | keyview_viewer_sdk | 10.4 | |
autonomy | keyview_viewer_sdk | 10.9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "F588C397-FB3F-4A04-A015-B6F6D9C3B994", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "C456319D-6699-4970-A146-6E52DD285D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "C558D1E3-4C6B-4C00-A415-5B9E343073D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "706571F3-D347-4760-A55B-4F465DAFCBFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "4056FDC9-27A4-41D9-9C84-B50A66F30161", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "73ECC62B-CED2-4401-A2F7-8E714D20D111", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in an unspecified library in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted compound file, as demonstrated using a Quattro Pro file, which is not properly handled by the Quattro speed reader (qpssr.dll)." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en la memoria din\u00e1mica en una librer\u00eda no especificada de Autonomy KeyView v10.4 y v10.9, como el usado en varios IBM, Symantec, y otros productos, permite a atacantes remotos ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de archivos compuestos manipulados, como lo demuestra el uso de ficheros Quattro Pro, que no es manejado apropiadamente por Quattro speed reader (qpssr.dll)." } ], "id": "CVE-2010-0126", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-17T20:00:02.423", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-16/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-16/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-10 02:46
Modified
2025-04-09 00:30
Severity ?
Summary
Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/27304 | Patch, Vendor Advisory | |
cve@mitre.org | http://securityreason.com/securityalert/3357 | ||
cve@mitre.org | http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html | ||
cve@mitre.org | http://securitytracker.com/id?1018853 | ||
cve@mitre.org | http://securitytracker.com/id?1018886 | ||
cve@mitre.org | http://vuln.sg/lotusnotes702-en.html | ||
cve@mitre.org | http://vuln.sg/lotusnotes702doc-en.html | ||
cve@mitre.org | http://vuln.sg/lotusnotes702mif-en.html | ||
cve@mitre.org | http://vuln.sg/lotusnotes702sam-en.html | ||
cve@mitre.org | http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21271111 | ||
cve@mitre.org | http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21272836 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/482664 | ||
cve@mitre.org | http://www.securityfocus.com/archive/1/483102/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/26175 | Patch | |
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3596 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2007/3697 | ||
cve@mitre.org | http://www.zerodayinitiative.com/advisories/ZDI-07-059.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27304 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/3357 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1018853 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1018886 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://vuln.sg/lotusnotes702-en.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://vuln.sg/lotusnotes702doc-en.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://vuln.sg/lotusnotes702mif-en.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://vuln.sg/lotusnotes702sam-en.html | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21271111 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21272836 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/482664 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/483102/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/26175 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3596 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2007/3697 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.zerodayinitiative.com/advisories/ZDI-07-059.html |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
activepdf | docconverter | 3.8.2_.5 | |
autonomy | keyview_export_sdk | * | |
autonomy | keyview_filter_sdk | * | |
autonomy | keyview_viewer_sdk | * | |
ibm | lotus_notes | * | |
symantec | mail_security | 5.0 | |
symantec | mail_security | 5.0 | |
symantec | mail_security | 5.0.0 | |
symantec | mail_security | 5.0.0.24 | |
symantec | mail_security | 5.0.1 | |
symantec | mail_security | 7.5 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:activepdf:docconverter:3.8.2_.5:*:*:*:*:*:*:*", "matchCriteriaId": "0D165E31-F294-4F7E-959F-7AFE69AF90A1", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "872E3116-26DC-492D-94EA-7BE531299FF8", "versionEndIncluding": "9.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "07FFE40A-6A96-4131-B537-8A4D8C1494AD", "versionEndIncluding": "9.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "D9E88061-F0E3-4CA9-8FCE-4B69FE4F3844", "versionEndIncluding": "9.2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*", "matchCriteriaId": "F61B72CC-BC8D-40AF-AE72-5A6EEFB53B10", "versionEndIncluding": "7.0.2", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*", "matchCriteriaId": "0648861C-A58E-4103-8720-4480C2F098FF", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*", "matchCriteriaId": "9608BF57-0D9A-4874-BFDA-C92447FACD70", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*", "matchCriteriaId": "5E7788BD-652E-4306-AED0-6AE7F9A07836", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*", "matchCriteriaId": "977786AB-A76C-4A1C-8999-BF4A5E08F8BE", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*", "matchCriteriaId": "A8430D5E-A8A7-4724-8A6B-B5E2CA437729", "vulnerable": true }, { "criteria": "cpe:2.3:a:symantec:mail_security:7.5:*:domino:*:*:*:*:*", "matchCriteriaId": "7D29BE63-3E26-4136-BAB1-AA3D50BA71F5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910." }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en el Autonomy (antiguamente Verity) KeyView Viewer, en el Filter y en el Export SDK anterior al 9.2.0.12, como el utilizado en el ActivePDF DocConverter, en el IBM Lotus Notes anterior al 7.0.3, en el Symantec Mail Security y en otros productos, permiten a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n a trav\u00e9s de modificaciones en (1) el fichero AG del kpagrdr.dll, (2) en el fichero AW del awsr.dll, (3) en el fichero DLL o el (4) EXE del exesr.dll, (5) en el fichero DOC del mwsr.dll, (6) en el fichero MIF del mifsr.dll, (7) en el fichero SAM del lasr.dll o (8) en el fichero RTF del rtfsr.dll. NOTA: el vector WPD (wp6sr.dll) se trata en la vulnerabilidad CVE-2007-5910." } ], "id": "CVE-2007-5909", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2007-11-10T02:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27304" }, { "source": "cve@mitre.org", "url": "http://securityreason.com/securityalert/3357" }, { "source": "cve@mitre.org", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018853" }, { "source": "cve@mitre.org", "url": "http://securitytracker.com/id?1018886" }, { "source": "cve@mitre.org", "url": "http://vuln.sg/lotusnotes702-en.html" }, { "source": "cve@mitre.org", "url": "http://vuln.sg/lotusnotes702doc-en.html" }, { "source": "cve@mitre.org", "url": "http://vuln.sg/lotusnotes702mif-en.html" }, { "source": "cve@mitre.org", "url": "http://vuln.sg/lotusnotes702sam-en.html" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111" }, { "source": "cve@mitre.org", "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21272836" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/482664" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/483102/100/0/threaded" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26175" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3596" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2007/3697" }, { "source": "cve@mitre.org", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-059.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityreason.com/securityalert/3357" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018853" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://securitytracker.com/id?1018886" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://vuln.sg/lotusnotes702-en.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://vuln.sg/lotusnotes702doc-en.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://vuln.sg/lotusnotes702mif-en.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://vuln.sg/lotusnotes702sam-en.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21271111" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-1.ibm.com/support/docview.wss?rs=899\u0026uid=swg21272836" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/482664" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/483102/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.securityfocus.com/bid/26175" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3596" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2007/3697" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.zerodayinitiative.com/advisories/ZDI-07-059.html" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-17 20:00
Modified
2025-04-11 00:51
Severity ?
Summary
Integer underflow in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted size for an unspecified record type, which triggers a heap-based buffer overflow.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-49/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/41928 | ||
PSIRT-CNA@flexerasoftware.com | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-49/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41928 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autonomy | keyview_export_sdk | 10.4 | |
autonomy | keyview_export_sdk | 10.9 | |
autonomy | keyview_filter_sdk | 10.4 | |
autonomy | keyview_filter_sdk | 10.9 | |
autonomy | keyview_viewer_sdk | 10.4 | |
autonomy | keyview_viewer_sdk | 10.9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "F588C397-FB3F-4A04-A015-B6F6D9C3B994", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "C456319D-6699-4970-A146-6E52DD285D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "C558D1E3-4C6B-4C00-A415-5B9E343073D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "706571F3-D347-4760-A55B-4F465DAFCBFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "4056FDC9-27A4-41D9-9C84-B50A66F30161", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "73ECC62B-CED2-4401-A2F7-8E714D20D111", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer underflow in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to cause a denial of service (crash) and possibly execute arbitrary code via a crafted size for an unspecified record type, which triggers a heap-based buffer overflow." }, { "lang": "es", "value": "Desbordamiento de entero en el lector SpreadSheet Lotus 123 (wkssr.dll) de Autonomy KeyView v10.4 y v10.9, como el usuado en IBM, Symantec, y otros productos, permite a los atacantes remotos causar una denegaci\u00f3n de servicio (ca\u00edda) y posiblemente ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de tama\u00f1os manipulados para un tipo de registro no especificado, lo que dispara un desbordamiento de b\u00fafer basados en pila." } ], "id": "CVE-2010-1525", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-17T20:00:03.127", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-49/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-49/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-17 20:00
Modified
2025-04-11 00:51
Severity ?
Summary
Multiple stack-based buffer overflows in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allow remote attackers to execute arbitrary code via unspecified vectors related to "certain records."
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-28/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/41928 | ||
PSIRT-CNA@flexerasoftware.com | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-28/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41928 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autonomy | keyview_export_sdk | 10.4 | |
autonomy | keyview_export_sdk | 10.9 | |
autonomy | keyview_filter_sdk | 10.4 | |
autonomy | keyview_filter_sdk | 10.9 | |
autonomy | keyview_viewer_sdk | 10.4 | |
autonomy | keyview_viewer_sdk | 10.9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "F588C397-FB3F-4A04-A015-B6F6D9C3B994", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "C456319D-6699-4970-A146-6E52DD285D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "C558D1E3-4C6B-4C00-A415-5B9E343073D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "706571F3-D347-4760-A55B-4F465DAFCBFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "4056FDC9-27A4-41D9-9C84-B50A66F30161", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "73ECC62B-CED2-4401-A2F7-8E714D20D111", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Multiple stack-based buffer overflows in the SpreadSheet Lotus 123 reader (wkssr.dll) in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allow remote attackers to execute arbitrary code via unspecified vectors related to \"certain records.\"" }, { "lang": "es", "value": "M\u00faltiples desbordamientos de b\u00fafer basados en pila en lector SpreadSheet Lotus 123 (wkssr.dll) de Autonomy KeyView v10.4 y v10.9, como el usado en IBM, Symantec, y otros productos, permite a atacantes remotos ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de vectores no especificados relacionados con \"ciertos registros\"." } ], "id": "CVE-2010-0133", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2010-08-17T20:00:02.657", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-28/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-28/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2007-11-15 22:46
Modified
2025-04-09 00:30
Severity ?
Summary
Heap-based buffer overflow in emlsr.dll before 2.0.0.4 in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK allows remote attackers to execute arbitrary code via a long Content-Type header line in an EML file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/27304 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/27304 | Patch, Vendor Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autonomy | keyview_export_sdk | * | |
autonomy | keyview_filter_sdk | * | |
autonomy | keyview_viewer_sdk | * |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "A67D0C2A-A57F-412E-A283-BDF2916B504A", "versionEndIncluding": "2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "51919804-6270-405E-BA6B-60E2D2B3D108", "versionEndIncluding": "2.0", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "0B1548A2-D821-4D5B-80B4-1014977A21B0", "versionEndIncluding": "2.0", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Heap-based buffer overflow in emlsr.dll before 2.0.0.4 in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK allows remote attackers to execute arbitrary code via a long Content-Type header line in an EML file. NOTE: the provenance of this information is unknown; the details are obtained solely from third party information." }, { "lang": "es", "value": "Desbordamiento de b\u00fafer basado en mont\u00edculo en emlsr.dll anterior a 2.0.0.4 de Autonomy (antiguamente Verity) KeyView Viewer, Filter, y Export SDK permite a atacantes remotos ejecutar c\u00f3digo de su elecci\u00f3n mediante una l\u00ednea de cabecera Content-Type larga en un fichero EML. NOTA: la procedencia de esta informaci\u00f3n es desconocida; los detalles se han obtenido de informaci\u00f3n de terceros." } ], "id": "CVE-2007-6008", "lastModified": "2025-04-09T00:30:58.490", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2007-11-15T22:46:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27304" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/27304" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-119" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2005-12-31 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Directory traversal vulnerability in kvarcve.dll in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allows remote attackers to delete arbitrary files via a (1) ZIP, (2) UUE or (3) TAR archive that contains a .. (dot dot) in the filename, which is not properly handled when generating a preview.
References
▶ | URL | Tags | |
---|---|---|---|
cve@mitre.org | http://secunia.com/advisories/16100 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/advisories/16280 | Patch, Vendor Advisory | |
cve@mitre.org | http://secunia.com/secunia_research/2005-30/advisory/ | Vendor Advisory | |
cve@mitre.org | http://secunia.com/secunia_research/2005-66/advisory/ | Vendor Advisory | |
cve@mitre.org | http://securitytracker.com/id?1015657 | Patch | |
cve@mitre.org | http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918 | Patch | |
cve@mitre.org | http://www.osvdb.org/23066 | Patch | |
cve@mitre.org | http://www.securityfocus.com/archive/1/424717/100/0/threaded | ||
cve@mitre.org | http://www.securityfocus.com/bid/16576 | ||
cve@mitre.org | http://www.vupen.com/english/advisories/2006/0500 | ||
cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/24637 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/16100 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/16280 | Patch, Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2005-30/advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2005-66/advisory/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://securitytracker.com/id?1015657 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/23066 | Patch | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/424717/100/0/threaded | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/16576 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.vupen.com/english/advisories/2006/0500 | ||
af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/24637 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autonomy | keyview_export_sdk | * | |
autonomy | keyview_filter_sdk | * | |
autonomy | keyview_viewer_sdk | * | |
ibm | lotus_notes | 6.0.1 | |
ibm | lotus_notes | 6.0.2 | |
ibm | lotus_notes | 6.0.3 | |
ibm | lotus_notes | 6.0.4 | |
ibm | lotus_notes | 6.0.5 | |
ibm | lotus_notes | 6.5 | |
ibm | lotus_notes | 6.5.1 | |
ibm | lotus_notes | 6.5.2 | |
ibm | lotus_notes | 6.5.3 | |
ibm | lotus_notes | 6.5.4 | |
ibm | lotus_notes | 7.0 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "E4CD7AAC-E4E2-47E4-A34D-47C670FA6254", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "754BD2C9-2100-4B21-B164-47487434D9E8", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*", "matchCriteriaId": "7B6DDCD8-B9AD-4757-A067-CF99372D7326", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*", "matchCriteriaId": "55D037CC-1207-48E2-882E-8B236EE7138F", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*", "matchCriteriaId": "5059BEF2-84EB-4B5F-84F5-9E3200B068F3", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*", "matchCriteriaId": "AB71B7AA-957B-46A6-9BC9-CE23EC721189", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*", "matchCriteriaId": "46CF28C0-51AD-4783-B1F0-205DF64D133A", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*", "matchCriteriaId": "9C0015A2-A70E-4B0C-B59A-44F5F611293D", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*", "matchCriteriaId": "1360A50E-C1E1-4690-874A-04CC7C1A77CC", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*", "matchCriteriaId": "D94927A9-61FD-459F-9A6D-E581A4AF505C", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*", "matchCriteriaId": "D3B32BA2-9EB7-4294-A857-226A5B1CC401", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*", "matchCriteriaId": "EF64CA16-6C20-42E1-BA68-BD63A873BFA9", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*", "matchCriteriaId": "12D7DD7B-CA90-44A5-9B7B-4A4985150689", "vulnerable": true }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "68AEB13D-C7C6-426F-8484-85EFF7245DF5", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Directory traversal vulnerability in kvarcve.dll in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allows remote attackers to delete arbitrary files via a (1) ZIP, (2) UUE or (3) TAR archive that contains a .. (dot dot) in the filename, which is not properly handled when generating a preview." } ], "id": "CVE-2005-2619", "lastModified": "2025-04-03T01:03:51.193", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": true, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": true } ] }, "published": "2005-12-31T05:00:00.000", "references": [ { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16100" }, { "source": "cve@mitre.org", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16280" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-30/advisory/" }, { "source": "cve@mitre.org", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-66/advisory/" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015657" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918" }, { "source": "cve@mitre.org", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23066" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/archive/1/424717/100/0/threaded" }, { "source": "cve@mitre.org", "url": "http://www.securityfocus.com/bid/16576" }, { "source": "cve@mitre.org", "url": "http://www.vupen.com/english/advisories/2006/0500" }, { "source": "cve@mitre.org", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24637" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16100" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ], "url": "http://secunia.com/advisories/16280" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-30/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2005-66/advisory/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://securitytracker.com/id?1015657" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www-1.ibm.com/support/docview.wss?rs=475\u0026uid=swg21229918" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ], "url": "http://www.osvdb.org/23066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/archive/1/424717/100/0/threaded" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/16576" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.vupen.com/english/advisories/2006/0500" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24637" } ], "sourceIdentifier": "cve@mitre.org", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-22" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
Vulnerability from fkie_nvd
Published
2010-08-17 20:00
Modified
2025-04-11 00:51
Severity ?
Summary
Integer signedness error in rtfsr.dll in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted \ls keyword in a list override table entry in an RTF file, which triggers a buffer overflow.
References
▶ | URL | Tags | |
---|---|---|---|
PSIRT-CNA@flexerasoftware.com | http://secunia.com/secunia_research/2010-27/ | Vendor Advisory | |
PSIRT-CNA@flexerasoftware.com | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
PSIRT-CNA@flexerasoftware.com | http://www.securityfocus.com/bid/41928 | ||
PSIRT-CNA@flexerasoftware.com | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/secunia_research/2010-27/ | Vendor Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www-01.ibm.com/support/docview.wss?uid=swg21440812 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/41928 | ||
af854a3a-2127-422b-91ae-364da2661108 | http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100727_01 |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
autonomy | keyview_export_sdk | 10.4 | |
autonomy | keyview_export_sdk | 10.9 | |
autonomy | keyview_filter_sdk | 10.4 | |
autonomy | keyview_filter_sdk | 10.9 | |
autonomy | keyview_viewer_sdk | 10.4 | |
autonomy | keyview_viewer_sdk | 10.9 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "F588C397-FB3F-4A04-A015-B6F6D9C3B994", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "C456319D-6699-4970-A146-6E52DD285D7F", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "C558D1E3-4C6B-4C00-A415-5B9E343073D8", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "706571F3-D347-4760-A55B-4F465DAFCBFF", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.4:*:*:*:*:*:*:*", "matchCriteriaId": "4056FDC9-27A4-41D9-9C84-B50A66F30161", "vulnerable": true }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:10.9:*:*:*:*:*:*:*", "matchCriteriaId": "73ECC62B-CED2-4401-A2F7-8E714D20D111", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "Integer signedness error in rtfsr.dll in Autonomy KeyView 10.4 and 10.9, as used in multiple IBM, Symantec, and other products, allows remote attackers to execute arbitrary code via a crafted \\ls keyword in a list override table entry in an RTF file, which triggers a buffer overflow." }, { "lang": "es", "value": "Error de entero sin signo en rtfsr.dll de Autonomy KeyView v10.4 y v10.9, como el usado en IBM, Symantec, y otros productos, permite a atacantes remotos ejecutar c\u00f3digo a su elecci\u00f3n a trav\u00e9s de \\ls keywor manipulada en una anulaci\u00f3n de la lista de tabla de entrada en un fichero RTF, lo cual provoca un desbordamiento de b\u00fafer." } ], "id": "CVE-2010-0134", "lastModified": "2025-04-11T00:51:21.963", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 8.6, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ] }, "published": "2010-08-17T20:00:02.767", "references": [ { "source": "PSIRT-CNA@flexerasoftware.com", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-27/" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "PSIRT-CNA@flexerasoftware.com", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ], "url": "http://secunia.com/secunia_research/2010-27/" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.securityfocus.com/bid/41928" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100727_01" } ], "sourceIdentifier": "PSIRT-CNA@flexerasoftware.com", "vulnStatus": "Deferred", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-189" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }