{"api_version":"1","generated_at":"2026-04-23T09:51:07+00:00","cve":"CVE-2008-4564","urls":{"html":"https://cve.report/CVE-2008-4564","api":"https://cve.report/api/cve/CVE-2008-4564.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2008-4564","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2008-4564"},"summary":{"title":"CVE-2008-4564","description":"Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file.","state":"PUBLISHED","assigner":"mitre","published_at":"2009-03-18 15:30:00","updated_at":"2026-04-23 00:35:47"},"problem_types":["CWE-119","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"9.3","severity":"","vector":"AV:N/AC:M/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://secunia.com/advisories/34318","name":"http://secunia.com/advisories/34318","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Autonomy KeyView SDK \"wp6sr.dll\" Buffer Overflow - Secunia Advisories - Vulnerability Information - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1021856","name":"http://securitytracker.com/id?1021856","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - Symantec Data Loss Prevention Buffer Overflow in Autonomy KeyView Module Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html","name":"https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Customer Support Site Login | HP Autonomy","mime":"text/xml","httpstatus":"200","archivestatus":"200"},{"url":"http://www.symantec.com/avcenter/security/Content/2009.03.17a.html","name":"http://www.symantec.com/avcenter/security/Content/2009.03.17a.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Symantec Security Advisory","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/34086","name":"http://www.securityfocus.com/bid/34086","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"504 Gateway Time-out","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"http://www.kb.cert.org/vuls/id/276563","name":"http://www.kb.cert.org/vuls/id/276563","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["US Government Resource"],"title":"Vulnerability Note VU#276563 - Autonomy KeyView SDK buffer overflow vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2009/0756","name":"http://www.vupen.com/english/advisories/2009/0756","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49284","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49284","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www-01.ibm.com/support/docview.wss?rs=463&uid=swg21377573","name":"http://www-01.ibm.com/support/docview.wss?rs=463&uid=swg21377573","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"IBM - Potential security issue with Lotus Notes file viewer for WordPerfect","mime":"text/html","httpstatus":"404","archivestatus":"200"},{"url":"http://osvdb.org/52713","name":"http://osvdb.org/52713","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.vupen.com/english/advisories/2009/0744","name":"http://www.vupen.com/english/advisories/2009/0744","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.vupen.com/english/advisories/2009/0757","name":"http://www.vupen.com/english/advisories/2009/0757","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Webmail : Solution de messagerie professionnelle - OVHcloud- OVH","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securitytracker.com/id?1021859","name":"http://www.securitytracker.com/id?1021859","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM Lotus Notes Buffer Overflows in File Viewer for WordPerfect Lets Remote Users Execute Arbitrary Code - SecurityTracker","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/34355","name":"http://secunia.com/advisories/34355","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Lotus Notes File Viewer \"wp6sr.dll\" Buffer Overflow - Secunia Advisories - Vulnerability Information - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://securitytracker.com/id?1021857","name":"http://securitytracker.com/id?1021857","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"SecurityTracker.com Archives - Symantec Mail Security Buffer Overflow in Autonomy KeyView Module Lets Remote Users Execute Arbitrary Code","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://secunia.com/advisories/34303","name":"http://secunia.com/advisories/34303","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Lotus Notes 6 File Viewer \"wp6sr.dll\" Buffer Overflow - Secunia Advisories - Vulnerability Information - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774","name":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"404"},{"url":"http://secunia.com/advisories/34307","name":"http://secunia.com/advisories/34307","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Symantec Products KeyView \"wp6sr.dll\" Buffer Overflow - Secunia Advisories - Vulnerability Information - Secunia.com","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2008-4564","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2008-4564","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_export_sdk","cpe6":"10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_export_sdk","cpe6":"10.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_export_sdk","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_export_sdk","cpe6":"9.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"10.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_export_sdk","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_filter_sdk","cpe6":"10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_filter_sdk","cpe6":"10.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_filter_sdk","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_filter_sdk","cpe6":"9.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"10.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_filter_sdk","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_viewer_sdk","cpe6":"10","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_viewer_sdk","cpe6":"10.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_viewer_sdk","cpe6":"2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_viewer_sdk","cpe6":"9.2.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"10.4","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"autonomy","cpe5":"keyview_viewer_sdk","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"5.0.12","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"5.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.0.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.0.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5.4","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5.5","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5.5","cpe7":"*","cpe8":"fp2","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5.5","cpe7":"*","cpe8":"fp3","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5.6","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"6.5.6","cpe7":"*","cpe8":"fp2","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"7.0.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"7.0.2","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"7.0.2","cpe7":"*","cpe8":"fp1","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"7.0.3","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"ibm","cpe5":"lotus_notes","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"altiris_deployment_solution","cpe6":"*","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"brightmail","cpe6":"5.0","cpe7":"*","cpe8":"appliance","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"data_loss_prevention_detection_servers","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"data_loss_prevention_detection_servers","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"data_loss_prevention_detection_servers","cpe6":"8.1","cpe7":"*","cpe8":"linux","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"data_loss_prevention_detection_servers","cpe6":"8.1","cpe7":"*","cpe8":"windows","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"data_loss_prevention_endpoint_agents","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"data_loss_prevention_endpoint_agents","cpe6":"8.1","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"enforce","cpe6":"7.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"enforce","cpe6":"8.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"enforce","cpe6":"8.1","cpe7":"*","cpe8":"linux","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"enforce","cpe6":"8.1","cpe7":"*","cpe8":"windows","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0","cpe7":"*","cpe8":"appliance","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.0","cpe7":"*","cpe8":"smtp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.0.24","cpe7":"*","cpe8":"appliance","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.1","cpe7":"*","cpe8":"smtp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.1.181","cpe7":"*","cpe8":"smtp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.1.182","cpe7":"*","cpe8":"smtp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.1.189","cpe7":"*","cpe8":"smtp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.1.200","cpe7":"*","cpe8":"smtp","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.10","cpe7":"*","cpe8":"microsoft_exchange","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"5.0.11","cpe7":"*","cpe8":"microsoft_exchange","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"6.0.6","cpe7":"microsoft_exchange","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"6.0.7","cpe7":"microsoft_exchange","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"7.5..4.29","cpe7":"*","cpe8":"domino","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"7.5.3.25","cpe7":"*","cpe8":"domino","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2008","cve_id":"4564","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"symantec","cpe5":"mail_security","cpe6":"7.5.5.32","cpe7":"*","cpe8":"domino","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-07T10:24:18.984Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www.symantec.com/avcenter/security/Content/2009.03.17a.html"},{"name":"ADV-2009-0744","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2009/0744"},{"name":"34303","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/34303"},{"name":"1021859","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://www.securitytracker.com/id?1021859"},{"name":"34307","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/34307"},{"name":"autonomy-keyview-wp6sr-bo(49284)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49284"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://www-01.ibm.com/support/docview.wss?rs=463&uid=swg21377573"},{"name":"34318","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/34318"},{"name":"1021856","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1021856"},{"name":"1021857","tags":["vdb-entry","x_refsource_SECTRACK","x_transferred"],"url":"http://securitytracker.com/id?1021857"},{"name":"VU#276563","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/276563"},{"name":"ADV-2009-0756","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2009/0756"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html"},{"name":"34355","tags":["third-party-advisory","x_refsource_SECUNIA","x_transferred"],"url":"http://secunia.com/advisories/34355"},{"name":"52713","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://osvdb.org/52713"},{"name":"20090317 Autonomy KeyView Word Perfect File Parsing Buffer Overflow Vulnerability","tags":["third-party-advisory","x_refsource_IDEFENSE","x_transferred"],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774"},{"name":"34086","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/34086"},{"name":"ADV-2009-0757","tags":["vdb-entry","x_refsource_VUPEN","x_transferred"],"url":"http://www.vupen.com/english/advisories/2009/0757"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2009-03-17T00:00:00.000Z","descriptions":[{"lang":"en","value":"Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2017-08-07T12:57:01.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"tags":["x_refsource_CONFIRM"],"url":"http://www.symantec.com/avcenter/security/Content/2009.03.17a.html"},{"name":"ADV-2009-0744","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2009/0744"},{"name":"34303","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/34303"},{"name":"1021859","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://www.securitytracker.com/id?1021859"},{"name":"34307","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/34307"},{"name":"autonomy-keyview-wp6sr-bo(49284)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49284"},{"tags":["x_refsource_CONFIRM"],"url":"http://www-01.ibm.com/support/docview.wss?rs=463&uid=swg21377573"},{"name":"34318","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/34318"},{"name":"1021856","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1021856"},{"name":"1021857","tags":["vdb-entry","x_refsource_SECTRACK"],"url":"http://securitytracker.com/id?1021857"},{"name":"VU#276563","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/276563"},{"name":"ADV-2009-0756","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2009/0756"},{"tags":["x_refsource_CONFIRM"],"url":"https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html"},{"name":"34355","tags":["third-party-advisory","x_refsource_SECUNIA"],"url":"http://secunia.com/advisories/34355"},{"name":"52713","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://osvdb.org/52713"},{"name":"20090317 Autonomy KeyView Word Perfect File Parsing Buffer Overflow Vulnerability","tags":["third-party-advisory","x_refsource_IDEFENSE"],"url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774"},{"name":"34086","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/34086"},{"name":"ADV-2009-0757","tags":["vdb-entry","x_refsource_VUPEN"],"url":"http://www.vupen.com/english/advisories/2009/0757"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2008-4564","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"http://www.symantec.com/avcenter/security/Content/2009.03.17a.html","refsource":"CONFIRM","url":"http://www.symantec.com/avcenter/security/Content/2009.03.17a.html"},{"name":"ADV-2009-0744","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2009/0744"},{"name":"34303","refsource":"SECUNIA","url":"http://secunia.com/advisories/34303"},{"name":"1021859","refsource":"SECTRACK","url":"http://www.securitytracker.com/id?1021859"},{"name":"34307","refsource":"SECUNIA","url":"http://secunia.com/advisories/34307"},{"name":"autonomy-keyview-wp6sr-bo(49284)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/49284"},{"name":"http://www-01.ibm.com/support/docview.wss?rs=463&uid=swg21377573","refsource":"CONFIRM","url":"http://www-01.ibm.com/support/docview.wss?rs=463&uid=swg21377573"},{"name":"34318","refsource":"SECUNIA","url":"http://secunia.com/advisories/34318"},{"name":"1021856","refsource":"SECTRACK","url":"http://securitytracker.com/id?1021856"},{"name":"1021857","refsource":"SECTRACK","url":"http://securitytracker.com/id?1021857"},{"name":"VU#276563","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/276563"},{"name":"ADV-2009-0756","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2009/0756"},{"name":"https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html","refsource":"CONFIRM","url":"https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html"},{"name":"34355","refsource":"SECUNIA","url":"http://secunia.com/advisories/34355"},{"name":"52713","refsource":"OSVDB","url":"http://osvdb.org/52713"},{"name":"20090317 Autonomy KeyView Word Perfect File Parsing Buffer Overflow Vulnerability","refsource":"IDEFENSE","url":"http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774"},{"name":"34086","refsource":"BID","url":"http://www.securityfocus.com/bid/34086"},{"name":"ADV-2009-0757","refsource":"VUPEN","url":"http://www.vupen.com/english/advisories/2009/0757"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2008-4564","datePublished":"2009-03-18T15:00:00.000Z","dateReserved":"2008-10-14T00:00:00.000Z","dateUpdated":"2024-08-07T10:24:18.984Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2009-03-18 15:30:00","lastModifiedDate":"2026-04-23 00:35:47","problem_types":["CWE-119","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:M/Au:N/C:C/I:C/A:C","baseScore":9.3,"accessVector":"NETWORK","accessComplexity":"MEDIUM","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":8.6,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":false,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":true}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*","versionEndIncluding":"10.4","matchCriteriaId":"6B16D7CE-3770-46A6-BECA-76989E9639BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_export_sdk:2.0:*:*:*:*:*:*:*","matchCriteriaId":"6DB3799E-43FC-40AA-85EC-72D87962C95D"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_export_sdk:9.2.0:*:*:*:*:*:*:*","matchCriteriaId":"B92810D7-A5C2-4118-8B67-9E1A49C6C4D2"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_export_sdk:10:*:*:*:*:*:*:*","matchCriteriaId":"893D0CC9-971E-4C78-AD80-D004D8BB5F37"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_export_sdk:10.3:*:*:*:*:*:*:*","matchCriteriaId":"15B8E1D9-ADF9-40B2-A652-53CDEF60FAB5"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*","versionEndIncluding":"10.4","matchCriteriaId":"177E8A5C-0812-47BC-9CFC-F8E25A0F42AB"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_filter_sdk:2.0:*:*:*:*:*:*:*","matchCriteriaId":"B8E3B7CC-48D2-4EB0-A0D9-44AA6947CF65"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_filter_sdk:9.2.0:*:*:*:*:*:*:*","matchCriteriaId":"B90F221E-6C5A-4844-A098-53BE40E78A40"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_filter_sdk:10:*:*:*:*:*:*:*","matchCriteriaId":"E4F4A68C-EF5D-41BB-A518-D277927D80D3"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_filter_sdk:10.3:*:*:*:*:*:*:*","matchCriteriaId":"EC6E0041-6647-4B04-B4C1-019E1F12E606"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*","versionEndIncluding":"10.4","matchCriteriaId":"BD370EEA-A33C-45B2-8FC6-C419AD6468E4"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_viewer_sdk:2.0:*:*:*:*:*:*:*","matchCriteriaId":"2FE65E34-052C-4614-BA69-71D96EBC65E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_viewer_sdk:9.2.0:*:*:*:*:*:*:*","matchCriteriaId":"B8D56C0E-3403-4B91-A064-69E46770FBBF"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_viewer_sdk:10:*:*:*:*:*:*:*","matchCriteriaId":"CBB6C6D0-0848-45D0-ACA7-03B46F42AE76"},{"vulnerable":true,"criteria":"cpe:2.3:a:autonomy:keyview_viewer_sdk:10.3:*:*:*:*:*:*:*","matchCriteriaId":"3E50CAF0-1F3A-4F57-A8DA-91B7840BBE3F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:5.0.3:*:*:*:*:*:*:*","matchCriteriaId":"0D4B2601-B62F-4235-BFFD-281235737450"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:5.0.12:*:*:*:*:*:*:*","matchCriteriaId":"273DF27B-9441-4925-BD7E-5709D7D059EE"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*","matchCriteriaId":"1E234AD1-7202-421E-82C8-880E84876021"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*","matchCriteriaId":"55D037CC-1207-48E2-882E-8B236EE7138F"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*","matchCriteriaId":"5059BEF2-84EB-4B5F-84F5-9E3200B068F3"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*","matchCriteriaId":"AB71B7AA-957B-46A6-9BC9-CE23EC721189"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*","matchCriteriaId":"46CF28C0-51AD-4783-B1F0-205DF64D133A"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*","matchCriteriaId":"9C0015A2-A70E-4B0C-B59A-44F5F611293D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*","matchCriteriaId":"1360A50E-C1E1-4690-874A-04CC7C1A77CC"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*","matchCriteriaId":"D94927A9-61FD-459F-9A6D-E581A4AF505C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*","matchCriteriaId":"D3B32BA2-9EB7-4294-A857-226A5B1CC401"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*","matchCriteriaId":"EF64CA16-6C20-42E1-BA68-BD63A873BFA9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*","matchCriteriaId":"12D7DD7B-CA90-44A5-9B7B-4A4985150689"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5.5:*:*:*:*:*:*:*","matchCriteriaId":"C63D40DF-C6F3-4502-9816-939265F10532"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5.5:*:fp2:*:*:*:*:*","matchCriteriaId":"F8B5BF9A-F8A7-4C2B-B093-8226D0ED1425"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5.5:*:fp3:*:*:*:*:*","matchCriteriaId":"04CB50C2-2B01-4A68-BE96-1127B9954F38"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5.6:*:*:*:*:*:*:*","matchCriteriaId":"4598C4A8-B19D-4562-A5B5-D3B090F0C8D7"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:6.5.6:*:fp2:*:*:*:*:*","matchCriteriaId":"66D334E1-9326-4D0A-8D87-572F3E6B44BD"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*","matchCriteriaId":"68AEB13D-C7C6-426F-8484-85EFF7245DF5"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*","matchCriteriaId":"94646433-DE15-4214-9C78-7D1DAB5A12D9"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*","matchCriteriaId":"3449A490-865A-4262-8482-429DEF455644"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:7.0.2:*:fp1:*:*:*:*:*","matchCriteriaId":"5614CD60-7690-47E6-AEB3-FB0151EB264C"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:7.0.3:*:*:*:*:*:*:*","matchCriteriaId":"F01C5CFC-7FB8-4D29-95AC-8EF59B0C170D"},{"vulnerable":true,"criteria":"cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*","matchCriteriaId":"692E295E-E650-42D5-AF7A-D6276C3D76E0"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:altiris_deployment_solution:*:*:*:*:*:*:*:*","matchCriteriaId":"3D6701EB-AF87-4B63-A8B5-AA27C28DFFB1"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:brightmail:5.0:*:appliance:*:*:*:*:*","matchCriteriaId":"E1BE16AC-118D-4BA0-AE37-3DB2E4E417DD"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:data_loss_prevention_detection_servers:7.0:*:*:*:*:*:*:*","matchCriteriaId":"1F945149-43CC-4EAC-9A78-C6A3BA6FAF9D"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:data_loss_prevention_detection_servers:8.0:*:*:*:*:*:*:*","matchCriteriaId":"1D42BEF4-9BB4-4CCF-9395-C306C3CEBB0C"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:data_loss_prevention_detection_servers:8.1:*:linux:*:*:*:*:*","matchCriteriaId":"DC2C0DBF-382C-4F96-8497-2FABD7CB67C3"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:data_loss_prevention_detection_servers:8.1:*:windows:*:*:*:*:*","matchCriteriaId":"42A91935-15AC-4F64-AD3D-EFAD08955562"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:data_loss_prevention_endpoint_agents:8.0:*:*:*:*:*:*:*","matchCriteriaId":"37076C05-12CE-484C-AB10-711BABFF6992"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:data_loss_prevention_endpoint_agents:8.1:*:*:*:*:*:*:*","matchCriteriaId":"2A5F3BAC-B470-4FB7-88AF-47A33D46EF00"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:enforce:7.0:*:*:*:*:*:*:*","matchCriteriaId":"CFD0A99F-6B8A-4BB9-B8A7-40BB5D7B7CFB"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:enforce:8.0:*:*:*:*:*:*:*","matchCriteriaId":"B8960720-5DF0-4F4C-9603-09A85FAF843D"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:enforce:8.1:*:linux:*:*:*:*:*","matchCriteriaId":"3E9D9CE3-109C-4035-9934-2B457268985D"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:enforce:8.1:*:windows:*:*:*:*:*","matchCriteriaId":"E258E769-38CC-4E62-8158-3D549263ED1C"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*","matchCriteriaId":"0648861C-A58E-4103-8720-4480C2F098FF"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.0:*:*:*:*:*:*:*","matchCriteriaId":"C890707A-D2DF-403A-87CB-2AB01E85D8B5"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*","matchCriteriaId":"5E7788BD-652E-4306-AED0-6AE7F9A07836"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*","matchCriteriaId":"977786AB-A76C-4A1C-8999-BF4A5E08F8BE"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*","matchCriteriaId":"A8430D5E-A8A7-4724-8A6B-B5E2CA437729"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.1.181:*:smtp:*:*:*:*:*","matchCriteriaId":"D602A441-863D-4E90-A01D-57C41725D008"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.1.182:*:smtp:*:*:*:*:*","matchCriteriaId":"A792A9C1-95EF-4CE2-B14F-3DEE09BFAF8A"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.1.189:*:smtp:*:*:*:*:*","matchCriteriaId":"5D9C7B86-7F9A-4DF8-A4DF-9A7CA5991D91"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.1.200:*:smtp:*:*:*:*:*","matchCriteriaId":"0117D61C-DEE6-4803-9CF8-27EEBAA493CA"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.10:*:microsoft_exchange:*:*:*:*:*","matchCriteriaId":"5BF163AF-E470-492A-940C-B2FB37AA2322"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:5.0.11:*:microsoft_exchange:*:*:*:*:*","matchCriteriaId":"95D5B1CF-6C20-4D66-9D30-631441FA953B"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:6.0.6:microsoft_exchange:*:*:*:*:*:*","matchCriteriaId":"5BBAE476-DB98-4464-81DF-8EC386E808B4"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:6.0.7:microsoft_exchange:*:*:*:*:*:*","matchCriteriaId":"225BA7A2-8C45-42F1-921B-105CF8F0F22A"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:7.5..4.29:*:domino:*:*:*:*:*","matchCriteriaId":"B1E6B709-B44B-47AC-A7FF-0C248D777D5F"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:7.5.3.25:*:domino:*:*:*:*:*","matchCriteriaId":"07FADB30-A418-43C5-A798-4769C5350E7B"},{"vulnerable":true,"criteria":"cpe:2.3:a:symantec:mail_security:7.5.5.32:*:domino:*:*:*:*:*","matchCriteriaId":"70F1A708-9914-4875-B594-D8A9D65182D8"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2008","CveId":"4564","Ordinal":"1","Title":"CVE-2008-4564","CVE":"CVE-2008-4564","Year":"2008"},"notes":[{"CveYear":"2008","CveId":"4564","Ordinal":"1","NoteData":"Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file.","Type":"Description","Title":"CVE-2008-4564"},{"CveYear":"2008","CveId":"4564","Ordinal":"2","NoteData":"2009-03-18","Type":"Other","Title":"Published"},{"CveYear":"2008","CveId":"4564","Ordinal":"3","NoteData":"2017-08-07","Type":"Other","Title":"Modified"}]}}}