Vulnerabilidad en Autonomy KeyView SDK (CVE-2008-4564)
Gravedad CVSS v2.0:
ALTA
Tipo:
CWE-119
Restricción de operaciones inapropiada dentro de los límites del búfer de la memoria
Fecha de publicación:
18/03/2009
Última modificación:
09/04/2025
Descripción
Desbordamiento de búfer basado en pila en wp6sr.dll en el Autonomy KeyView SDK 10.4 y anteriores, como es usado en IBM Lotus Notes, productos Symantec Mail Security (SMS), productos Symantec BrightMail Appliance y productos Symantec Data Loss Prevention (DLP) permite a atacantes remotos ejecutar código de su elección mediante un fichero Word Perfect Document (WPD) manipulado.
Impacto
Puntuación base 2.0
9.30
Gravedad 2.0
ALTA
Productos y versiones vulnerables
| CPE | Desde | Hasta |
|---|---|---|
| cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:* | 10.4 (incluyendo) | |
| cpe:2.3:a:autonomy:keyview_export_sdk:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autonomy:keyview_export_sdk:9.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autonomy:keyview_export_sdk:10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autonomy:keyview_export_sdk:10.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:* | 10.4 (incluyendo) | |
| cpe:2.3:a:autonomy:keyview_filter_sdk:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autonomy:keyview_filter_sdk:9.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autonomy:keyview_filter_sdk:10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autonomy:keyview_filter_sdk:10.3:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:* | 10.4 (incluyendo) | |
| cpe:2.3:a:autonomy:keyview_viewer_sdk:2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autonomy:keyview_viewer_sdk:9.2.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autonomy:keyview_viewer_sdk:10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:autonomy:keyview_viewer_sdk:10.3:*:*:*:*:*:*:* |
Para consultar la lista completa de nombres de CPE con productos y versiones, ver esta página
Referencias a soluciones, herramientas e información
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774
- http://osvdb.org/52713
- http://secunia.com/advisories/34303
- http://secunia.com/advisories/34307
- http://secunia.com/advisories/34318
- http://secunia.com/advisories/34355
- http://securitytracker.com/id?1021856=
- http://securitytracker.com/id?1021857=
- http://www-01.ibm.com/support/docview.wss?rs=463&uid=swg21377573
- http://www.kb.cert.org/vuls/id/276563
- http://www.securityfocus.com/bid/34086
- http://www.securitytracker.com/id?1021859=
- http://www.symantec.com/avcenter/security/Content/2009.03.17a.html
- http://www.vupen.com/english/advisories/2009/0744
- http://www.vupen.com/english/advisories/2009/0756
- http://www.vupen.com/english/advisories/2009/0757
- https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49284
- http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774
- http://osvdb.org/52713
- http://secunia.com/advisories/34303
- http://secunia.com/advisories/34307
- http://secunia.com/advisories/34318
- http://secunia.com/advisories/34355
- http://securitytracker.com/id?1021856=
- http://securitytracker.com/id?1021857=
- http://www-01.ibm.com/support/docview.wss?rs=463&uid=swg21377573
- http://www.kb.cert.org/vuls/id/276563
- http://www.securityfocus.com/bid/34086
- http://www.securitytracker.com/id?1021859=
- http://www.symantec.com/avcenter/security/Content/2009.03.17a.html
- http://www.vupen.com/english/advisories/2009/0744
- http://www.vupen.com/english/advisories/2009/0756
- http://www.vupen.com/english/advisories/2009/0757
- https://customers.autonomy.com/support/secure/docs/Updates/Keyview/Filter%20SDK/10.4/kv_update_nti40_10.4.zip.readme.html
- https://exchange.xforce.ibmcloud.com/vulnerabilities/49284



