CVE-2007-5909
Summary
| CVE | CVE-2007-5909 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-11-10 02:46:00 UTC |
| Updated | 2018-10-15 21:47:00 UTC |
| Description | Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910. |
Risk And Classification
Problem Types: CWE-119
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Activepdf | Docconverter | 3.8.2_.5 | All | All | All |
| Application | Activepdf | Docconverter | 3.8.2_.5 | All | All | All |
| Application | Autonomy | Keyview Export Sdk | All | All | All | All |
| Application | Autonomy | Keyview Filter Sdk | All | All | All | All |
| Application | Autonomy | Keyview Viewer Sdk | All | All | All | All |
| Application | Ibm | Lotus Notes | All | All | All | All |
| Application | Symantec | Mail Security | 5.0 | All | appliance | All |
| Application | Symantec | Mail Security | 5.0 | All | microsoft_exchange | All |
| Application | Symantec | Mail Security | 5.0.0 | All | smtp | All |
| Application | Symantec | Mail Security | 5.0.0.24 | All | appliance | All |
| Application | Symantec | Mail Security | 5.0.1 | All | smtp | All |
| Application | Symantec | Mail Security | 7.5 | All | domino | All |
| Application | Symantec | Mail Security | 5.0 | All | appliance | All |
| Application | Symantec | Mail Security | 5.0 | All | microsoft_exchange | All |
| Application | Symantec | Mail Security | 5.0.0 | All | smtp | All |
| Application | Symantec | Mail Security | 5.0.0.24 | All | appliance | All |
| Application | Symantec | Mail Security | 5.0.1 | All | smtp | All |
| Application | Symantec | Mail Security | 7.5 | All | domino | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| SecurityReason - IBM Lotus Notes Attachment Viewer Buffer Overflow Vulnerabilities | SREASON | securityreason.com | |
| [vuln.sg] IBM Lotus Notes mwsr.dll DOC Attachment Viewer Buffer Overflow | MISC | vuln.sg | |
| Autonomy KeyView Multiple Buffer Overflow Vulnerabilities | BID | www.securityfocus.com | Patch |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| [vuln.sg] IBM Lotus Notes lasr.dll SAM Attachment Viewer Buffer Overflow | MISC | vuln.sg | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| [vuln.sg] IBM Lotus Notes mifsr.dll MIF Attachment Viewer Buffer Overflow | MISC | vuln.sg | |
| Verity Keyview SDK Multiple Vulnerabilities - Advisories - Secunia | SECUNIA | secunia.com | Patch, Vendor Advisory |
| Symantec Security Center | CONFIRM | securityresponse.symantec.com | |
| SecurityTracker.com Archives - IBM Lotus Notes Buffer Overflows in File Attachment Viewer Lets Remote Users Execute Arbitrary Code | SECTRACK | securitytracker.com | |
| Zero Day Initiative | MISC | www.zerodayinitiative.com | |
| SecurityTracker.com Archives - Symantec Mail Security Buffer Overflows in KeyView Module Let Remote Users Execute Arbitrary Code | SECTRACK | securitytracker.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| [vuln.sg] IBM Lotus Notes Attachment Viewer Buffer Overflow Vulnerabilities | MISC | vuln.sg | |
| IBM notice: The page you requested cannot be displayed | CONFIRM | www-1.ibm.com | |
| IBM notice: The page you requested cannot be displayed | CONFIRM | www-1.ibm.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
No vendor comments have been submitted for this CVE.
There are currently no legacy QID mappings associated with this CVE.