CVE-2007-5909
Published Nov 10, 2007
Last updated 6 years ago
Overview
- Description
- Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:activepdf:docconverter:3.8.2_.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D165E31-F294-4F7E-959F-7AFE69AF90A1" }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "872E3116-26DC-492D-94EA-7BE531299FF8", "versionEndIncluding": "9.2.0" }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07FFE40A-6A96-4131-B537-8A4D8C1494AD", "versionEndIncluding": "9.2.0" }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9E88061-F0E3-4CA9-8FCE-4B69FE4F3844", "versionEndIncluding": "9.2.0" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F61B72CC-BC8D-40AF-AE72-5A6EEFB53B10", "versionEndIncluding": "7.0.2" }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0648861C-A58E-4103-8720-4480C2F098FF" }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9608BF57-0D9A-4874-BFDA-C92447FACD70" }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E7788BD-652E-4306-AED0-6AE7F9A07836" }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "977786AB-A76C-4A1C-8999-BF4A5E08F8BE" }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8430D5E-A8A7-4724-8A6B-B5E2CA437729" }, { "criteria": "cpe:2.3:a:symantec:mail_security:7.5:*:domino:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D29BE63-3E26-4136-BAB1-AA3D50BA71F5" } ], "operator": "OR" } ] } ]