Vulnerability CVE-2007-5909


Published: 2007-11-09   Modified: 2012-02-12

Description:
Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910.

See advisories in our WLB2 database:
Topic
Author
Date
High
IBM Lotus Notes Attachment Viewer Buffer Overflow Vulnerabilities
Tan Chew Keong
11.11.2007

Type:

CWE-119

(Improper Restriction of Operations within the Bounds of a Memory Buffer)

CVSS2 => (AV:N/AC:M/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
9.3/10
10/10
8.6/10
Exploit range
Attack complexity
Authentication
Remote
Medium
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Symantec -> Mail security 
IBM -> Lotus notes 
Autonomy -> Keyview export sdk 
Autonomy -> Keyview filter sdk 
Autonomy -> Keyview viewer sdk 
Activepdf -> Docconverter 

 References:
http://securityreason.com/securityalert/3357
http://securityresponse.symantec.com/avcenter/security/Content/2007.11.01c.html
http://securitytracker.com/id?1018853
http://securitytracker.com/id?1018886
http://vuln.sg/lotusnotes702-en.html
http://vuln.sg/lotusnotes702doc-en.html
http://vuln.sg/lotusnotes702mif-en.html
http://vuln.sg/lotusnotes702sam-en.html
http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21271111
http://www-1.ibm.com/support/docview.wss?rs=899&uid=swg21272836
http://www.securityfocus.com/archive/1/482664
http://www.securityfocus.com/archive/1/483102/100/0/threaded
http://www.securityfocus.com/bid/26175
http://www.vupen.com/english/advisories/2007/3596
http://www.vupen.com/english/advisories/2007/3697
http://www.zerodayinitiative.com/advisories/ZDI-07-059.html

Copyright 2024, cxsecurity.com

 

Back to Top