// For flags

CVE-2007-5909

Verity KeyView SDK Multiple File Format Parsing Vulnerabilities

Severity Score

9.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910.

Múltiples desbordamientos de búfer basados en pila en el Autonomy (antiguamente Verity) KeyView Viewer, en el Filter y en el Export SDK anterior al 9.2.0.12, como el utilizado en el ActivePDF DocConverter, en el IBM Lotus Notes anterior al 7.0.3, en el Symantec Mail Security y en otros productos, permiten a atacantes remotos ejecutar código de su elección a través de modificaciones en (1) el fichero AG del kpagrdr.dll, (2) en el fichero AW del awsr.dll, (3) en el fichero DLL o el (4) EXE del exesr.dll, (5) en el fichero DOC del mwsr.dll, (6) en el fichero MIF del mifsr.dll, (7) en el fichero SAM del lasr.dll o (8) en el fichero RTF del rtfsr.dll. NOTA: el vector WPD (wp6sr.dll) se trata en la vulnerabilidad CVE-2007-5910.

Several vulnerabilities exist in the popular Verity KeyView SDK used in many enterprise applications like IBM Lotus Notes. When parsing several different file formats a standard stack overflow occurs allowing a malicious user to gain complete control of the affected machine under the rights of the currently logged in user. The problem lies when copying user supplied data to a stack based buffer without any boundary conditions.
The following file formats have been identified as vulnerable:
Adobe Acrobat FrameMaker - .mifApplix Words - .awMicrosoft Rich Text Format - .rtfPortable Executable - .exeDynamic Link Library - .dllApplix Presents - .agMicrosoft Word - .doc

*Credits: Eric DETOISIEN
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Complete
Integrity
Complete
Availability
Complete
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2007-10-31 CVE Published
  • 2007-11-09 CVE Reserved
  • 2024-08-06 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Activepdf
Search vendor "Activepdf"
Docconverter
Search vendor "Activepdf" for product "Docconverter"
3.8.2_.5
Search vendor "Activepdf" for product "Docconverter" and version "3.8.2_.5"
-
Affected
Autonomy
Search vendor "Autonomy"
Keyview Export Sdk
Search vendor "Autonomy" for product "Keyview Export Sdk"
<= 9.2.0
Search vendor "Autonomy" for product "Keyview Export Sdk" and version " <= 9.2.0"
-
Affected
Autonomy
Search vendor "Autonomy"
Keyview Filter Sdk
Search vendor "Autonomy" for product "Keyview Filter Sdk"
<= 9.2.0
Search vendor "Autonomy" for product "Keyview Filter Sdk" and version " <= 9.2.0"
-
Affected
Autonomy
Search vendor "Autonomy"
Keyview Viewer Sdk
Search vendor "Autonomy" for product "Keyview Viewer Sdk"
<= 9.2.0
Search vendor "Autonomy" for product "Keyview Viewer Sdk" and version " <= 9.2.0"
-
Affected
Ibm
Search vendor "Ibm"
Lotus Notes
Search vendor "Ibm" for product "Lotus Notes"
<= 7.0.2
Search vendor "Ibm" for product "Lotus Notes" and version " <= 7.0.2"
-
Affected
Symantec
Search vendor "Symantec"
Mail Security
Search vendor "Symantec" for product "Mail Security"
5.0
Search vendor "Symantec" for product "Mail Security" and version "5.0"
appliance
Affected
Symantec
Search vendor "Symantec"
Mail Security
Search vendor "Symantec" for product "Mail Security"
5.0
Search vendor "Symantec" for product "Mail Security" and version "5.0"
microsoft_exchange
Affected
Symantec
Search vendor "Symantec"
Mail Security
Search vendor "Symantec" for product "Mail Security"
5.0.0
Search vendor "Symantec" for product "Mail Security" and version "5.0.0"
smtp
Affected
Symantec
Search vendor "Symantec"
Mail Security
Search vendor "Symantec" for product "Mail Security"
5.0.0.24
Search vendor "Symantec" for product "Mail Security" and version "5.0.0.24"
appliance
Affected
Symantec
Search vendor "Symantec"
Mail Security
Search vendor "Symantec" for product "Mail Security"
5.0.1
Search vendor "Symantec" for product "Mail Security" and version "5.0.1"
smtp
Affected
Symantec
Search vendor "Symantec"
Mail Security
Search vendor "Symantec" for product "Mail Security"
7.5
Search vendor "Symantec" for product "Mail Security" and version "7.5"
domino
Affected