Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allow remote attackers to execute arbitrary code via (1) a UUE file containing an encoded file with a long filename handled by uudrdr.dll, (2) a compressed ZIP file with a long filename handled by kvarcve.dll, (3) a TAR archive with a long filename that is extracted to a directory with a long path handled by the TAR reader (tarrdr.dll), (4) an email that contains a long HTTP, FTP, or // link handled by the HTML speed reader (htmsr.dll) or (5) an email containing a crafted long link handled by the HTML speed reader (htmsr.dll).
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:59
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/16100 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/16280 - Patch, Vendor Advisory | |
References | () http://secunia.com/secunia_research/2005-32/advisory/ - Vendor Advisory | |
References | () http://secunia.com/secunia_research/2005-34/advisory/ - Vendor Advisory | |
References | () http://secunia.com/secunia_research/2005-36/advisory/ - Vendor Advisory | |
References | () http://secunia.com/secunia_research/2005-37/advisory/ - Vendor Advisory | |
References | () http://secunia.com/secunia_research/2005-66/advisory/ - Vendor Advisory | |
References | () http://securitytracker.com/id?1015657 - Patch | |
References | () http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918 - Patch | |
References | () http://www.kb.cert.org/vuls/id/884076 - Third Party Advisory, US Government Resource | |
References | () http://www.osvdb.org/23064 - Patch | |
References | () http://www.osvdb.org/23065 - Patch | |
References | () http://www.osvdb.org/23066 - Patch | |
References | () http://www.osvdb.org/23067 - Patch | |
References | () http://www.osvdb.org/23068 - Patch | |
References | () http://www.securityfocus.com/archive/1/424626/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/424666/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/424689/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/424692/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16576 - | |
References | () http://www.vupen.com/english/advisories/2006/0500 - | |
References | () http://www.vupen.com/english/advisories/2006/0501 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24635 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24636 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24638 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24639 - |
Information
Published : 2005-12-31 05:00
Updated : 2024-11-20 23:59
NVD link : CVE-2005-2618
Mitre link : CVE-2005-2618
CVE.ORG link : CVE-2005-2618
JSON object : View
Products Affected
autonomy
- keyview_filter_sdk
- keyview_viewer_sdk
- keyview_export_sdk
ibm
- lotus_notes
CWE
CWE-119
Improper Restriction of Operations within the Bounds of a Memory Buffer