CVE-2007-6020

Multiple stack-based buffer overflows in foliosr.dll in the Folio Flat File speed reader in Autonomy (formerly Verity) KeyView 10.3.0.0, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, allow remote attackers to execute arbitrary code via a long attribute value in a (1) DI, (2) FD, (3) FT, (4) JD, (5) JL, (6) LE, (7) OB, (8) OD, (9) OL, (10) PN, (11) PS, (12) PW, (13) RD, (14) QL, or (15) TS tag in a .fff file.
References
Link Resource
http://secunia.com/advisories/27763 Vendor Advisory
http://secunia.com/advisories/28140 Vendor Advisory
http://secunia.com/advisories/28209 Vendor Advisory
http://secunia.com/advisories/28210 Vendor Advisory
http://secunia.com/advisories/29342 Vendor Advisory
http://secunia.com/secunia_research/2007-104/advisory/ Vendor Advisory
http://secunia.com/secunia_research/2007-105/advisory/ Vendor Advisory
http://secunia.com/secunia_research/2007-106/advisory/ Vendor Advisory
http://secunia.com/secunia_research/2007-107/advisory/ Vendor Advisory
http://securitytracker.com/id?1019805
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453 Vendor Advisory
http://www.securityfocus.com/archive/1/490827/100/0/threaded
http://www.securityfocus.com/archive/1/490829/100/0/threaded
http://www.securityfocus.com/archive/1/490830/100/0/threaded
http://www.securityfocus.com/archive/1/490831/100/0/threaded
http://www.securityfocus.com/bid/28454
http://www.securitytracker.com/id?1019841
http://www.symantec.com/avcenter/security/Content/2008.04.08e.html
http://www.vupen.com/english/advisories/2008/1153
http://www.vupen.com/english/advisories/2008/1154
http://www.vupen.com/english/advisories/2008/1156
https://exchange.xforce.ibmcloud.com/vulnerabilities/41716
http://secunia.com/advisories/27763 Vendor Advisory
http://secunia.com/advisories/28140 Vendor Advisory
http://secunia.com/advisories/28209 Vendor Advisory
http://secunia.com/advisories/28210 Vendor Advisory
http://secunia.com/advisories/29342 Vendor Advisory
http://secunia.com/secunia_research/2007-104/advisory/ Vendor Advisory
http://secunia.com/secunia_research/2007-105/advisory/ Vendor Advisory
http://secunia.com/secunia_research/2007-106/advisory/ Vendor Advisory
http://secunia.com/secunia_research/2007-107/advisory/ Vendor Advisory
http://securitytracker.com/id?1019805
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453 Vendor Advisory
http://www.securityfocus.com/archive/1/490827/100/0/threaded
http://www.securityfocus.com/archive/1/490829/100/0/threaded
http://www.securityfocus.com/archive/1/490830/100/0/threaded
http://www.securityfocus.com/archive/1/490831/100/0/threaded
http://www.securityfocus.com/bid/28454
http://www.securitytracker.com/id?1019841
http://www.symantec.com/avcenter/security/Content/2008.04.08e.html
http://www.vupen.com/english/advisories/2008/1153
http://www.vupen.com/english/advisories/2008/1154
http://www.vupen.com/english/advisories/2008/1156
https://exchange.xforce.ibmcloud.com/vulnerabilities/41716
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:activepdf:docconverter:3.8.4.0:*:*:*:*:*:*:*
cpe:2.3:a:autonomy:keyview:2.0.0.2:*:*:*:*:*:*:*
cpe:2.3:a:autonomy:keyview:10.3.0.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:ibm:lotus_notes:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:symantec:mail_security:5.0:*:microsoft_exchange:*:*:*:*:*
cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*
cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*
cpe:2.3:a:symantec:mail_security:7.5:*:domino:*:*:*:*:*
cpe:2.3:a:symantec:mail_security_appliance:5.0:*:*:*:*:*:*:*

History

21 Nov 2024, 00:39

Type Values Removed Values Added
References () http://secunia.com/advisories/27763 - Vendor Advisory () http://secunia.com/advisories/27763 - Vendor Advisory
References () http://secunia.com/advisories/28140 - Vendor Advisory () http://secunia.com/advisories/28140 - Vendor Advisory
References () http://secunia.com/advisories/28209 - Vendor Advisory () http://secunia.com/advisories/28209 - Vendor Advisory
References () http://secunia.com/advisories/28210 - Vendor Advisory () http://secunia.com/advisories/28210 - Vendor Advisory
References () http://secunia.com/advisories/29342 - Vendor Advisory () http://secunia.com/advisories/29342 - Vendor Advisory
References () http://secunia.com/secunia_research/2007-104/advisory/ - Vendor Advisory () http://secunia.com/secunia_research/2007-104/advisory/ - Vendor Advisory
References () http://secunia.com/secunia_research/2007-105/advisory/ - Vendor Advisory () http://secunia.com/secunia_research/2007-105/advisory/ - Vendor Advisory
References () http://secunia.com/secunia_research/2007-106/advisory/ - Vendor Advisory () http://secunia.com/secunia_research/2007-106/advisory/ - Vendor Advisory
References () http://secunia.com/secunia_research/2007-107/advisory/ - Vendor Advisory () http://secunia.com/secunia_research/2007-107/advisory/ - Vendor Advisory
References () http://securitytracker.com/id?1019805 - () http://securitytracker.com/id?1019805 -
References () http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453 - Vendor Advisory () http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453 - Vendor Advisory
References () http://www.securityfocus.com/archive/1/490827/100/0/threaded - () http://www.securityfocus.com/archive/1/490827/100/0/threaded -
References () http://www.securityfocus.com/archive/1/490829/100/0/threaded - () http://www.securityfocus.com/archive/1/490829/100/0/threaded -
References () http://www.securityfocus.com/archive/1/490830/100/0/threaded - () http://www.securityfocus.com/archive/1/490830/100/0/threaded -
References () http://www.securityfocus.com/archive/1/490831/100/0/threaded - () http://www.securityfocus.com/archive/1/490831/100/0/threaded -
References () http://www.securityfocus.com/bid/28454 - () http://www.securityfocus.com/bid/28454 -
References () http://www.securitytracker.com/id?1019841 - () http://www.securitytracker.com/id?1019841 -
References () http://www.symantec.com/avcenter/security/Content/2008.04.08e.html - () http://www.symantec.com/avcenter/security/Content/2008.04.08e.html -
References () http://www.vupen.com/english/advisories/2008/1153 - () http://www.vupen.com/english/advisories/2008/1153 -
References () http://www.vupen.com/english/advisories/2008/1154 - () http://www.vupen.com/english/advisories/2008/1154 -
References () http://www.vupen.com/english/advisories/2008/1156 - () http://www.vupen.com/english/advisories/2008/1156 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/41716 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/41716 -

Information

Published : 2008-04-10 18:05

Updated : 2024-11-21 00:39


NVD link : CVE-2007-6020

Mitre link : CVE-2007-6020

CVE.ORG link : CVE-2007-6020


JSON object : View

Products Affected

symantec

  • mail_security_appliance
  • mail_security

activepdf

  • docconverter

autonomy

  • keyview

ibm

  • lotus_notes
CWE
CWE-119

Improper Restriction of Operations within the Bounds of a Memory Buffer