{"api_version":"1","generated_at":"2026-04-23T11:59:39+00:00","cve":"CVE-2007-5405","urls":{"html":"https://cve.report/CVE-2007-5405","api":"https://cve.report/api/cve/CVE-2007-5405.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-5405","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-5405"},"summary":{"title":"CVE-2007-5405","description":"Multiple buffer overflows in kpagrdr.dll 2.0.0.2 and 10.3.0.0 in the Applix Presents reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, allow remote attackers to execute arbitrary code via a .ag file with (1) a long ENCODING attribute in a *BEGIN tag, (2) a long token, or (3) the initial *BEGIN tag.","state":"PUBLISHED","assigner":"flexera","published_at":"2008-04-10 18:05:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-119","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"9.3","severity":"","vector":"AV:N/AC:M/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41721","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41721","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1154","name":"http://www.vupen.com/english/advisories/2008/1154","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id?1019844","name":"http://www.securitytracker.com/id?1019844","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM Lotus Notes Buffer Overflows in Applix Viewer Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/28454","name":"http://www.securityfocus.com/bid/28454","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Autonomy KeyView Module Multiple Buffer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/secunia_research/2007-96/advisory/","name":"http://secunia.com/secunia_research/2007-96/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Lotus Notes Applix Graphics Parsing Vulnerabilities - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1156","name":"http://www.vupen.com/english/advisories/2008/1156","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/28210","name":"http://secunia.com/advisories/28210","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Lotus Notes Multiple Keyview Parsing Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2007-97/advisory/","name":"http://secunia.com/secunia_research/2007-97/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"activePDF DocConverter Applix Graphics Parsing Vulnerabilities - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/490839/100/0/threaded","name":"http://www.securityfocus.com/archive/1/490839/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/490825/100/0/threaded","name":"http://www.securityfocus.com/archive/1/490825/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453","name":"http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM Potential security vulnerabilities in Lotus Notes file viewers for Applix Presents, Folio Flat File, HTML speed reader, KeyView and MIME - United States","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.symantec.com/avcenter/security/Content/2008.04.08e.html","name":"http://www.symantec.com/avcenter/security/Content/2008.04.08e.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"404 Not Found","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://secunia.com/advisories/28209","name":"http://secunia.com/advisories/28209","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Autonomy Keyview SDK Multiple Buffer Overflows - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1019805","name":"http://securitytracker.com/id?1019805","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - Symantec Mail Security Buffer Overflows in Autonomy KeyView Module Let Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/29342","name":"http://secunia.com/advisories/29342","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Symantec Mail Security Attachment Parsing Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/490838/100/0/threaded","name":"http://www.securityfocus.com/archive/1/490838/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2007-95/advisory/","name":"http://secunia.com/secunia_research/2007-95/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Autonomy Keyview Applix Graphics Parsing Vulnerabilities - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2007-98/advisory/","name":"http://secunia.com/secunia_research/2007-98/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Symantec Mail Security Applix Graphics Parsing Vulnerabilities - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/28140","name":"http://secunia.com/advisories/28140","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"activePDF DocConverter Multiple Parsing Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/490837/100/0/threaded","name":"http://www.securityfocus.com/archive/1/490837/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27763","name":"http://secunia.com/advisories/27763","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Symantec Mail Security for Exchange Attachment Parsing Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1153","name":"http://www.vupen.com/english/advisories/2008/1153","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-5405","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-5405","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"activepdf","cpe5":"docconverter","cpe6":"3.8.2_.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"activepdf","cpe5":"docconverter","cpe6":"3.8.4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview","cpe6":"10.3.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview","cpe6":"2.0.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"7.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"7.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0","cpe7":"*","cpe8":"microsoft_exchange","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.0","cpe7":"*","cpe8":"smtp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.1","cpe7":"*","cpe8":"smtp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"7.5","cpe7":"*","cpe8":"domino","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5405","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security_appliance","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T15:31:58.216Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"28140","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/28140"},{"name":"29342","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/29342"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2007-97/advisory/"},{"name":"27763","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27763"},{"name":"autonomy-keyview-applix-multiple-bo(41721)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41721"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.symantec.com/avcenter/security/Content/2008.04.08e.html"},{"name":"28209","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/28209"},{"name":"20080414 Secunia Research: Symantec Mail Security Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/490838/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2007-96/advisory/"},{"name":"ADV-2008-1156","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1156"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453"},{"name":"28454","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/28454"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2007-95/advisory/"},{"name":"28210","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/28210"},{"name":"1019844","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1019844"},{"name":"20080414 Secunia Research: Lotus Notes Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/490825/100/0/threaded"},{"name":"ADV-2008-1154","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1154"},{"name":"20080414 Secunia Research: Autonomy Keyview Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/490837/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2007-98/advisory/"},{"name":"20080414 Secunia Research: activePDF DocConverter Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/490839/100/0/threaded"},{"name":"1019805","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1019805"},{"name":"ADV-2008-1153","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1153"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-04-08T00:00:00.000Z","descriptions":[{"lang":"en","value":"Multiple buffer overflows in kpagrdr.dll 2.0.0.2 and 10.3.0.0 in the Applix Presents reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, allow remote attackers to execute arbitrary code via a .ag file with (1) a long ENCODING attribute in a *BEGIN tag, (2) a long token, or (3) the initial *BEGIN tag."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-15T20:57:01.000Z","orgId":"44d08088-2bea-4760-83a6-1e9be26b15ab","shortName":"flexera"},"references":[{"name":"28140","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/28140"},{"name":"29342","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/29342"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2007-97/advisory/"},{"name":"27763","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27763"},{"name":"autonomy-keyview-applix-multiple-bo(41721)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41721"},{"tags":["x_refsource_CONFIRM"],"url":"http://www.symantec.com/avcenter/security/Content/2008.04.08e.html"},{"name":"28209","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/28209"},{"name":"20080414 Secunia Research: Symantec Mail Security Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/490838/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2007-96/advisory/"},{"name":"ADV-2008-1156","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1156"},{"tags":["x_refsource_CONFIRM"],"url":"http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453"},{"name":"28454","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/28454"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2007-95/advisory/"},{"name":"28210","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/28210"},{"name":"1019844","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1019844"},{"name":"20080414 Secunia Research: Lotus Notes Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/490825/100/0/threaded"},{"name":"ADV-2008-1154","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1154"},{"name":"20080414 Secunia Research: Autonomy Keyview Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/490837/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2007-98/advisory/"},{"name":"20080414 Secunia Research: activePDF DocConverter Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/490839/100/0/threaded"},{"name":"1019805","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1019805"},{"name":"ADV-2008-1153","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1153"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"PSIRT-CNA@flexerasoftware.com","ID":"CVE-2007-5405","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Multiple buffer overflows in kpagrdr.dll 2.0.0.2 and 10.3.0.0 in the Applix Presents reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, allow remote attackers to execute arbitrary code via a .ag file with (1) a long ENCODING attribute in a *BEGIN tag, (2) a long token, or (3) the initial *BEGIN tag."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"28140","refsource":"SECUNIA","url":"http://secunia.com/advisories/28140"},{"name":"29342","refsource":"SECUNIA","url":"http://secunia.com/advisories/29342"},{"name":"http://secunia.com/secunia_research/2007-97/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2007-97/advisory/"},{"name":"27763","refsource":"SECUNIA","url":"http://secunia.com/advisories/27763"},{"name":"autonomy-keyview-applix-multiple-bo(41721)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41721"},{"name":"http://www.symantec.com/avcenter/security/Content/2008.04.08e.html","refsource":"CONFIRM","url":"http://www.symantec.com/avcenter/security/Content/2008.04.08e.html"},{"name":"28209","refsource":"SECUNIA","url":"http://secunia.com/advisories/28209"},{"name":"20080414 Secunia Research: Symantec Mail Security Applix Graphics ParsingVulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/490838/100/0/threaded"},{"name":"http://secunia.com/secunia_research/2007-96/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2007-96/advisory/"},{"name":"ADV-2008-1156","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1156"},{"name":"http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453","refsource":"CONFIRM","url":"http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453"},{"name":"28454","refsource":"BID","url":"http://www.securityfocus.com/bid/28454"},{"name":"http://secunia.com/secunia_research/2007-95/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2007-95/advisory/"},{"name":"28210","refsource":"SECUNIA","url":"http://secunia.com/advisories/28210"},{"name":"1019844","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1019844"},{"name":"20080414 Secunia Research: Lotus Notes Applix Graphics ParsingVulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/490825/100/0/threaded"},{"name":"ADV-2008-1154","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1154"},{"name":"20080414 Secunia Research: Autonomy Keyview Applix Graphics ParsingVulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/490837/100/0/threaded"},{"name":"http://secunia.com/secunia_research/2007-98/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2007-98/advisory/"},{"name":"20080414 Secunia Research: activePDF DocConverter Applix Graphics ParsingVulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/490839/100/0/threaded"},{"name":"1019805","refsource":"SECTRACK","url":"http://securitytracker.com/id?1019805"},{"name":"ADV-2008-1153","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1153"}]}}}},"cveMetadata":{"assignerOrgId":"44d08088-2bea-4760-83a6-1e9be26b15ab","assignerShortName":"flexera","cveId":"CVE-2007-5405","datePublished":"2008-04-10T18:00:00.000Z","dateReserved":"2007-10-12T00:00:00.000Z","dateUpdated":"2024-08-07T15:31:58.216Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-04-10 18:05:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-119","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:activepdf:docconverter:3.8.2_.5:*:*:*:*:*:*:*","matchCriteriaId":"0D165E31-F294-4F7E-959F-7AFE69AF90A1"},{"vulnerable":true,"criteria":"cpe:2.3:a:activepdf:docconverter:3.8.4.0:*:*:*:*:*:*:*","matchCriteriaId":"D4286B71-18BA-4BC0-9E2C-6D00A24974E3"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview:2.0.0.2:*:*:*:*:*:*:*","matchCriteriaId":"E6634684-2416-4A5C-A5C7-B1E946B33419"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview:10.3.0.0:*:*:*:*:*:*:*","matchCriteriaId":"589D3BC2-ED1F-4C5B-8F94-67AE1909580D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*","matchCriteriaId":"1E234AD1-7202-421E-82C8-880E84876021"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*","matchCriteriaId":"1360A50E-C1E1-4690-874A-04CC7C1A77CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*","matchCriteriaId":"68AEB13D-C7C6-426F-8484-85EFF7245DF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*","matchCriteriaId":"3449A490-865A-4262-8482-429DEF455644"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:7.0.3:*:*:*:*:*:*:*","matchCriteriaId":"F01C5CFC-7FB8-4D29-95AC-8EF59B0C170D"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*","matchCriteriaId":"9608BF57-0D9A-4874-BFDA-C92447FACD70"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*","matchCriteriaId":"5E7788BD-652E-4306-AED0-6AE7F9A07836"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*","matchCriteriaId":"A8430D5E-A8A7-4724-8A6B-B5E2CA437729"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:7.5:*:domino:*:*:*:*:*","matchCriteriaId":"7D29BE63-3E26-4136-BAB1-AA3D50BA71F5"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security_appliance:5.0:*:*:*:*:*:*:*","matchCriteriaId":"8CA92128-13DD-47D8-8822-23C4CDDFB715"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"5405","Ordinal":"1","Title":"CVE-2007-5405","CVE":"CVE-2007-5405","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"5405","Ordinal":"1","NoteData":"Multiple buffer overflows in kpagrdr.dll 2.0.0.2 and 10.3.0.0 in the Applix Presents reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, allow remote attackers to execute arbitrary code via a .ag file with (1) a long ENCODING attribute in a *BEGIN tag, (2) a long token, or (3) the initial *BEGIN tag.","Type":"Description","Title":"CVE-2007-5405"},{"CveYear":"2007","CveId":"5405","Ordinal":"2","NoteData":"2008-04-10","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"5405","Ordinal":"3","NoteData":"2018-10-15","Type":"Other","Title":"Modified"}]}}}