CVE-2007-5910
Published Nov 10, 2007
Last updated 14 years ago
Overview
- Description
- Stack-based buffer overflow in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, wp6sr.dll in IBM Lotus Notes 8.0 and before 7.0.3, Symantec Mail Security, and other products, allows remote attackers to execute arbitrary code via a crafted WordPerfect (WPD) file.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 9.3
- Impact score
- 10
- Exploitability score
- 8.6
- Vector string
- AV:N/AC:M/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-119
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:activepdf:docconverter:3.8.2_.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0D165E31-F294-4F7E-959F-7AFE69AF90A1" }, { "criteria": "cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "872E3116-26DC-492D-94EA-7BE531299FF8", "versionEndIncluding": "9.2.0" }, { "criteria": "cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "07FFE40A-6A96-4131-B537-8A4D8C1494AD", "versionEndIncluding": "9.2.0" }, { "criteria": "cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D9E88061-F0E3-4CA9-8FCE-4B69FE4F3844", "versionEndIncluding": "9.2.0" }, { "criteria": "cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "F61B72CC-BC8D-40AF-AE72-5A6EEFB53B10", "versionEndIncluding": "7.0.2" }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0648861C-A58E-4103-8720-4480C2F098FF" }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9608BF57-0D9A-4874-BFDA-C92447FACD70" }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5E7788BD-652E-4306-AED0-6AE7F9A07836" }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "977786AB-A76C-4A1C-8999-BF4A5E08F8BE" }, { "criteria": "cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A8430D5E-A8A7-4724-8A6B-B5E2CA437729" }, { "criteria": "cpe:2.3:a:symantec:mail_security:7.5:*:domino:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7D29BE63-3E26-4136-BAB1-AA3D50BA71F5" } ], "operator": "OR" } ] } ]