{"api_version":"1","generated_at":"2026-04-23T11:59:40+00:00","cve":"CVE-2007-5406","urls":{"html":"https://cve.report/CVE-2007-5406","api":"https://cve.report/api/cve/CVE-2007-5406.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2007-5406","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2007-5406"},"summary":{"title":"CVE-2007-5406","description":"kpagrdr.dll 2.0.0.2 and 10.3.0.0 in the Applix Presents reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, does not properly parse long tokens, which allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted .ag file.","state":"PUBLISHED","assigner":"flexera","published_at":"2008-04-10 18:05:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"9.3","severity":"","vector":"AV:N/AC:M/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41722","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41722","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1154","name":"http://www.vupen.com/english/advisories/2008/1154","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id?1019844","name":"http://www.securitytracker.com/id?1019844","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM Lotus Notes Buffer Overflows in Applix Viewer Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/28454","name":"http://www.securityfocus.com/bid/28454","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Autonomy KeyView Module Multiple Buffer Overflow Vulnerabilities","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://secunia.com/secunia_research/2007-96/advisory/","name":"http://secunia.com/secunia_research/2007-96/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Lotus Notes Applix Graphics Parsing Vulnerabilities - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1156","name":"http://www.vupen.com/english/advisories/2008/1156","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/28210","name":"http://secunia.com/advisories/28210","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Lotus Notes Multiple Keyview Parsing Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2007-97/advisory/","name":"http://secunia.com/secunia_research/2007-97/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"activePDF DocConverter Applix Graphics Parsing Vulnerabilities - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/490839/100/0/threaded","name":"http://www.securityfocus.com/archive/1/490839/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/490825/100/0/threaded","name":"http://www.securityfocus.com/archive/1/490825/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/28209","name":"http://secunia.com/advisories/28209","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Autonomy Keyview SDK Multiple Buffer Overflows - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1019805","name":"http://securitytracker.com/id?1019805","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - Symantec Mail Security Buffer Overflows in Autonomy KeyView Module Let Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/29342","name":"http://secunia.com/advisories/29342","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Symantec Mail Security Attachment Parsing Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/490838/100/0/threaded","name":"http://www.securityfocus.com/archive/1/490838/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2007-95/advisory/","name":"http://secunia.com/secunia_research/2007-95/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Autonomy Keyview Applix Graphics Parsing Vulnerabilities - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/secunia_research/2007-98/advisory/","name":"http://secunia.com/secunia_research/2007-98/advisory/","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Symantec Mail Security Applix Graphics Parsing Vulnerabilities - Secunia Research - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/28140","name":"http://secunia.com/advisories/28140","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"activePDF DocConverter Multiple Parsing Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/archive/1/490837/100/0/threaded","name":"http://www.securityfocus.com/archive/1/490837/100/0/threaded","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityFocus","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/27763","name":"http://secunia.com/advisories/27763","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Symantec Mail Security for Exchange Attachment Parsing Vulnerabilities - Advisories - Secunia","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2008/1153","name":"http://www.vupen.com/english/advisories/2008/1153","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2007-5406","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2007-5406","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2007","cve_id":"5406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"8.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0","cpe7":"*","cpe8":"microsoft_exchange","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.0","cpe7":"*","cpe8":"smtp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5406","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.1","cpe7":"*","cpe8":"smtp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2007","cve_id":"5406","vulnerable":"1","versionEndIncluding":"7.5","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"*","cpe7":"*","cpe8":"domino","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T15:31:58.865Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"28140","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/28140"},{"name":"29342","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/29342"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2007-97/advisory/"},{"name":"27763","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/27763"},{"name":"28209","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/28209"},{"name":"20080414 Secunia Research: Symantec Mail Security Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/490838/100/0/threaded"},{"name":"autonomy-keyview-applix-dos(41722)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41722"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2007-96/advisory/"},{"name":"ADV-2008-1156","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1156"},{"name":"28454","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/28454"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2007-95/advisory/"},{"name":"28210","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/28210"},{"name":"1019844","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1019844"},{"name":"20080414 Secunia Research: Lotus Notes Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/490825/100/0/threaded"},{"name":"ADV-2008-1154","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1154"},{"name":"20080414 Secunia Research: Autonomy Keyview Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/490837/100/0/threaded"},{"tags":["x_refsource_MISC","x_transferred"],"url":"http://secunia.com/secunia_research/2007-98/advisory/"},{"name":"20080414 Secunia Research: activePDF DocConverter Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://www.securityfocus.com/archive/1/490839/100/0/threaded"},{"name":"1019805","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1019805"},{"name":"ADV-2008-1153","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2008/1153"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2008-04-08T00:00:00.000Z","descriptions":[{"lang":"en","value":"kpagrdr.dll 2.0.0.2 and 10.3.0.0 in the Applix Presents reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, does not properly parse long tokens, which allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted .ag file."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2018-10-15T20:57:01.000Z","orgId":"44d08088-2bea-4760-83a6-1e9be26b15ab","shortName":"flexera"},"references":[{"name":"28140","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/28140"},{"name":"29342","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/29342"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2007-97/advisory/"},{"name":"27763","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/27763"},{"name":"28209","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/28209"},{"name":"20080414 Secunia Research: Symantec Mail Security Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/490838/100/0/threaded"},{"name":"autonomy-keyview-applix-dos(41722)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41722"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2007-96/advisory/"},{"name":"ADV-2008-1156","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1156"},{"name":"28454","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/28454"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2007-95/advisory/"},{"name":"28210","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/28210"},{"name":"1019844","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1019844"},{"name":"20080414 Secunia Research: Lotus Notes Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/490825/100/0/threaded"},{"name":"ADV-2008-1154","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1154"},{"name":"20080414 Secunia Research: Autonomy Keyview Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/490837/100/0/threaded"},{"tags":["x_refsource_MISC"],"url":"http://secunia.com/secunia_research/2007-98/advisory/"},{"name":"20080414 Secunia Research: activePDF DocConverter Applix Graphics ParsingVulnerabilities","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://www.securityfocus.com/archive/1/490839/100/0/threaded"},{"name":"1019805","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1019805"},{"name":"ADV-2008-1153","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2008/1153"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"PSIRT-CNA@flexerasoftware.com","ID":"CVE-2007-5406","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"kpagrdr.dll 2.0.0.2 and 10.3.0.0 in the Applix Presents reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, does not properly parse long tokens, which allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted .ag file."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"28140","refsource":"SECUNIA","url":"http://secunia.com/advisories/28140"},{"name":"29342","refsource":"SECUNIA","url":"http://secunia.com/advisories/29342"},{"name":"http://secunia.com/secunia_research/2007-97/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2007-97/advisory/"},{"name":"27763","refsource":"SECUNIA","url":"http://secunia.com/advisories/27763"},{"name":"28209","refsource":"SECUNIA","url":"http://secunia.com/advisories/28209"},{"name":"20080414 Secunia Research: Symantec Mail Security Applix Graphics ParsingVulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/490838/100/0/threaded"},{"name":"autonomy-keyview-applix-dos(41722)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/41722"},{"name":"http://secunia.com/secunia_research/2007-96/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2007-96/advisory/"},{"name":"ADV-2008-1156","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1156"},{"name":"28454","refsource":"BID","url":"http://www.securityfocus.com/bid/28454"},{"name":"http://secunia.com/secunia_research/2007-95/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2007-95/advisory/"},{"name":"28210","refsource":"SECUNIA","url":"http://secunia.com/advisories/28210"},{"name":"1019844","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1019844"},{"name":"20080414 Secunia Research: Lotus Notes Applix Graphics ParsingVulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/490825/100/0/threaded"},{"name":"ADV-2008-1154","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1154"},{"name":"20080414 Secunia Research: Autonomy Keyview Applix Graphics ParsingVulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/490837/100/0/threaded"},{"name":"http://secunia.com/secunia_research/2007-98/advisory/","refsource":"MISC","url":"http://secunia.com/secunia_research/2007-98/advisory/"},{"name":"20080414 Secunia Research: activePDF DocConverter Applix Graphics ParsingVulnerabilities","refsource":"BUGTRAQ","url":"http://www.securityfocus.com/archive/1/490839/100/0/threaded"},{"name":"1019805","refsource":"SECTRACK","url":"http://securitytracker.com/id?1019805"},{"name":"ADV-2008-1153","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2008/1153"}]}}}},"cveMetadata":{"assignerOrgId":"44d08088-2bea-4760-83a6-1e9be26b15ab","assignerShortName":"flexera","cveId":"CVE-2007-5406","datePublished":"2008-04-10T18:00:00.000Z","dateReserved":"2007-10-12T00:00:00.000Z","dateUpdated":"2024-08-07T15:31:58.865Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2008-04-10 18:05:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"operator":"AND","nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*","matchCriteriaId":"1E234AD1-7202-421E-82C8-880E84876021"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*","matchCriteriaId":"1360A50E-C1E1-4690-874A-04CC7C1A77CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*","matchCriteriaId":"68AEB13D-C7C6-426F-8484-85EFF7245DF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*","matchCriteriaId":"692E295E-E650-42D5-AF7A-D6276C3D76E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:8.0.1:*:*:*:*:*:*:*","matchCriteriaId":"50660BA1-A24A-4DBF-AB59-1CF04FA54120"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:*:*:domino:*:*:*:*:*","versionEndIncluding":"7.5","matchCriteriaId":"6D9CF359-CBCB-4EA2-B189-3CF01CE694D0"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0:*:*:*:*:*:*:*","matchCriteriaId":"9C3D6178-9D83-44C7-8EBB-50CDB68CB5EC"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*","matchCriteriaId":"9608BF57-0D9A-4874-BFDA-C92447FACD70"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*","matchCriteriaId":"5E7788BD-652E-4306-AED0-6AE7F9A07836"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*","matchCriteriaId":"A8430D5E-A8A7-4724-8A6B-B5E2CA437729"}]},{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview:*:*:*:*:*:*:*:*","matchCriteriaId":"3A31DE25-F7B5-4AEA-B870-2B852F4FD8A3"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2007","CveId":"5406","Ordinal":"1","Title":"CVE-2007-5406","CVE":"CVE-2007-5406","Year":"2007"},"notes":[{"CveYear":"2007","CveId":"5406","Ordinal":"1","NoteData":"kpagrdr.dll 2.0.0.2 and 10.3.0.0 in the Applix Presents reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, does not properly parse long tokens, which allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted .ag file.","Type":"Description","Title":"CVE-2007-5406"},{"CveYear":"2007","CveId":"5406","Ordinal":"2","NoteData":"2008-04-10","Type":"Other","Title":"Published"},{"CveYear":"2007","CveId":"5406","Ordinal":"3","NoteData":"2018-10-15","Type":"Other","Title":"Modified"}]}}}