var-201107-0115
Vulnerability from variot
Buffer overflow in the Lotus Freelance Graphics PRZ file viewer in Autonomy KeyView, as used in Symantec Mail Security (SMS) 6.x through 8.x, Symantec Brightmail and Messaging Gateway before 9.5.1, and Symantec Data Loss Prevention (DLP) before 10.5.3 and 11.x before 11.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted .prz file. NOTE: this may overlap CVE-2011-1217. Autonomy KeyView IDOL Contains multiple vulnerabilities in file decoding. Autonomy Provided by Autonomy KeyView IDOL Is 1000 A library that decodes the above file formats. IBM Lotus Notes , Lotus Domino , Symantec Mail Security , Hyland OnBase Used in such applications. Autonomy KeyView IDOL Contains multiple vulnerabilities in file decoding.Although the impact will vary depending on the application, service operation may be interrupted by opening a specially crafted file. (DoS) An attacker may be attacked or execute arbitrary code with user privileges. Autonomy KeyView Filter is prone to a buffer-overflow vulnerability because of a failure to properly bounds check user-supplied input. An attacker can exploit this issue by enticing an unsuspecting victim to open a malicious file or email attachment. Failed exploit attempts will result in a denial-of-service condition. NOTE: This issue was previously discussed in BID 47962 (IBM Lotus Notes Attachment Handling Multiple Buffer Overflow Vulnerabilities) but has been given its own record to better document it. KeyView is a software package for exporting, converting and viewing files in various formats.
For more information: SA44820
SOLUTION: Do not open documents from untrusted sources.
For more information: SA44820
Successful exploitation requires the attachment content scanning option to be enabled.
SOLUTION: Disable the attachment content scanning option. ----------------------------------------------------------------------
Alerts when vulnerabilities pose a threat to your infrastructure The enhanced reporting module of the Secunia Vulnerability Intelligence Manager (VIM) enables you to combine advisory and ticket information, and generate policy compliance statistics. Using your asset list preferences, customised notifications are issued as soon as a new vulnerability is discovered - a valuable tool for documenting mitigation strategies.
For more information see vulnerability #6 in: SA44624
Please see the vendor's advisory for the list for affected products. ----------------------------------------------------------------------
Join Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria See to the presentation "The Dynamics and Threats of End-Point Software Portfolios" by Secunia's Research Analyst Director, Stefan Frei. Read more: http://conference.first.org/
TITLE: Autonomy KeyView File Processing Vulnerabilities
SECUNIA ADVISORY ID: SA44820
VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/44820/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=44820
RELEASE DATE: 2011-06-08
DISCUSS ADVISORY: http://secunia.com/advisories/44820/#comments
AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s)
http://secunia.com/advisories/44820/
ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS
https://ca.secunia.com/?page=viewadvisory&vuln_id=44820
ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING
http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/
DESCRIPTION: Multiple vulnerabilities have been reported in Autonomy KeyView, which can be exploited by malicious people to compromise a vulnerable system.
1) An error when processing Windows Write (WRI) files can be exploited to cause a stack-based buffer overflow.
2) Some errors when processing unspecified file formats can be exploited to corrupt memory. No further information is currently available.
The vulnerabilities are reported in versions prior to 10.13.1.
SOLUTION: Update to version 10.13.1.
PROVIDED AND/OR DISCOVERED BY: Will Dormann and Jared Allar, CERT/CC.
ORIGINAL ADVISORY: US-CERT (VU#126159): http://www.kb.cert.org/vuls/id/126159
OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/
About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.
Subscribe: http://secunia.com/advisories/secunia_security_advisories/
Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/
Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.
Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org
Show details on source website{ "@context": { "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#", "affected_products": { "@id": "https://www.variotdbs.pl/ref/affected_products" }, "configurations": { "@id": "https://www.variotdbs.pl/ref/configurations" }, "credits": { "@id": "https://www.variotdbs.pl/ref/credits" }, "cvss": { "@id": "https://www.variotdbs.pl/ref/cvss/" }, "description": { "@id": "https://www.variotdbs.pl/ref/description/" }, "exploit_availability": { "@id": "https://www.variotdbs.pl/ref/exploit_availability/" }, "external_ids": { "@id": "https://www.variotdbs.pl/ref/external_ids/" }, "iot": { "@id": "https://www.variotdbs.pl/ref/iot/" }, "iot_taxonomy": { "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/" }, "patch": { "@id": "https://www.variotdbs.pl/ref/patch/" }, "problemtype_data": { "@id": "https://www.variotdbs.pl/ref/problemtype_data/" }, "references": { "@id": "https://www.variotdbs.pl/ref/references/" }, "sources": { "@id": "https://www.variotdbs.pl/ref/sources/" }, "sources_release_date": { "@id": "https://www.variotdbs.pl/ref/sources_release_date/" }, "sources_update_date": { "@id": "https://www.variotdbs.pl/ref/sources_update_date/" }, "threat_type": { "@id": "https://www.variotdbs.pl/ref/threat_type/" }, "title": { "@id": "https://www.variotdbs.pl/ref/title/" }, "type": { "@id": "https://www.variotdbs.pl/ref/type/" } }, "@id": "https://www.variotdbs.pl/vuln/VAR-201107-0115", "affected_products": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/affected_products#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "model": "data loss prevention", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "10.5.1" }, { "model": "brightmail and messaging gateway", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "7.7" }, { "model": "data loss prevention", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "10.5" }, { "model": "data loss prevention", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "8.1" }, { "model": "data loss prevention", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "8.1.1" }, { "model": "brightmail and messaging gateway", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "4.1.0" }, { "model": "brightmail and messaging gateway", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "4.0.0" }, { "model": "brightmail and messaging gateway", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "5.0" }, { "model": "data loss prevention", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "8.0" }, { "model": "data loss prevention", "scope": "eq", "trust": 1.6, "vendor": "symantec", "version": "10" }, { "model": "mail security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "7.5" }, { "model": "brightmail and messaging gateway", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.1" }, { "model": "brightmail and messaging gateway", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.0" }, { "model": "data loss prevention", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "7.0" }, { "model": "mail security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "6.0.0" }, { "model": "data loss prevention", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "11.0" }, { "model": "data loss prevention", "scope": "lte", "trust": 1.0, "vendor": "symantec", "version": "10.5.2" }, { "model": "data loss prevention", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0" }, { "model": "data loss prevention", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "7.2" }, { "model": "brightmail and messaging gateway", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0" }, { "model": "brightmail and messaging gateway", "scope": "lte", "trust": 1.0, "vendor": "symantec", "version": "9.5" }, { "model": "data loss prevention", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "7.1" }, { "model": "brightmail and messaging gateway", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "9.0.2" }, { "model": "mail security", "scope": "eq", "trust": 1.0, "vendor": "symantec", "version": "8.0" }, { "model": null, "scope": null, "trust": 0.8, "vendor": "autonomy", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "ca", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "emc", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "hyland", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "lotus", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "mcafee", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "palisade", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "proofpoint", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "symantec", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "trend micro", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "verdasys", "version": null }, { "model": null, "scope": null, "trust": 0.8, "vendor": "websense", "version": null }, { "model": "keyview idol", "scope": "lt", "trust": 0.8, "vendor": "autonomy", "version": "10.13.1 earlier" }, { "model": "brightmail gateway and symantec messaging gateway", "scope": "lte", "trust": 0.8, "vendor": "symantec", "version": "9.5" }, { "model": "data loss prevention endpoint agents", "scope": "lte", "trust": 0.8, "vendor": "symantec", "version": "10.x" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "11.x" }, { "model": "data loss prevention enforce/detection servers", "scope": "lte", "trust": 0.8, "vendor": "symantec", "version": "(linux) 10.x" }, { "model": "data loss prevention enforce/detection servers", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "(linux) 11.x" }, { "model": "data loss prevention enforce/detection servers", "scope": "lte", "trust": 0.8, "vendor": "symantec", "version": "(windows) 10.x" }, { "model": "data loss prevention enforce/detection servers", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "(windows) 11.x" }, { "model": "mail security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "(domino) 7.5.x" }, { "model": "mail security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "(domino) 8.x" }, { "model": "mail security", "scope": "eq", "trust": 0.8, "vendor": "symantec", "version": "(exchange) 6.x" }, { "model": "mail security for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "6.5.1" }, { "model": "mail security for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "6.5" }, { "model": "mail security for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "6.0.11" }, { "model": "mail security for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "6.0.10" }, { "model": "mail security for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "6.0.9" }, { "model": "mail security for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "6.0.8" }, { "model": "mail security for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "6.0.7" }, { "model": "mail security for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "6.0.6" }, { "model": "mail security for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "6.0.5" }, { "model": "mail security for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "6.0" }, { "model": "mail security for microsoft exchange", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "6.0.0.1" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0.6" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0.3" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0.2" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0.1" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.5.10" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.5.9" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.5.8" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.5.7" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.5.6" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.5.325" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.5.5.32" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.5.4.29" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.5.3.25" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.5.0.19" }, { "model": "mail security for domino", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.5" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.5.1" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1010.18007" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.187" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.2" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.1" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.101" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.10.9" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.3" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.6.2" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0.10.38" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "11.0" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.5" }, { "model": "data loss prevention endpoint agents", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.5.1" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1010.18007" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.185" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.3" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.2" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.1" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.101" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.10.8" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.228" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.5.15" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "11.0" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.5" }, { "model": "data loss prevention detection servers for windows", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.5.1" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0.1010.18007" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.185" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.3" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.2" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.1" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.101" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.10.8" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.1" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "7.238" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1.5.15" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.1" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "11.0" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.5" }, { "model": "data loss prevention detection servers for linux", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "10.0" }, { "model": "brightmail gateway series appliance", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "83000" }, { "model": "brightmail gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0.2" }, { "model": "brightmail gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0.2" }, { "model": "brightmail gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0.1" }, { "model": "brightmail gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.0" }, { "model": "brightmail gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "8.0" }, { "model": "brightmail and messaging gateway", "scope": "eq", "trust": 0.3, "vendor": "symantec", "version": "9.5" }, { "model": "host data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.2" }, { "model": "host data loss prevention", "scope": "eq", "trust": 0.3, "vendor": "mcafee", "version": "9.1" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.2" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5.1" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.3" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.2" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.1" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.5.6" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.5.5" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.5.4" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.5.3" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.5.2" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.5.1" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.5" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.5" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "8.0" }, { "model": "lotus notes fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.2" }, { "model": "lotus notes fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0.2" }, { "model": "lotus notes", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "7.0" }, { "model": "lotus notes fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.5.6" }, { "model": "lotus notes fp3", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.5.5" }, { "model": "lotus notes fp2", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.5.5" }, { "model": "lotus notes fp1", "scope": "eq", "trust": 0.3, "vendor": "ibm", "version": "6.5.2" }, { "model": "keyview viewer sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.4" }, { "model": "keyview viewer sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.3" }, { "model": "keyview viewer sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "9.2" }, { "model": "keyview viewer sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.9" }, { "model": "keyview viewer sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.8" }, { "model": "keyview viewer sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.5" }, { "model": "keyview viewer sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.12" }, { "model": "keyview viewer sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.11" }, { "model": "keyview viewer sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.10" }, { "model": "keyview viewer sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10" }, { "model": "keyview idol", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10" }, { "model": "keyview filter sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.9" }, { "model": "keyview filter sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.4" }, { "model": "keyview filter sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.3" }, { "model": "keyview filter sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "9.2" }, { "model": "keyview filter sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.8" }, { "model": "keyview filter sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.5" }, { "model": "keyview filter sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.12" }, { "model": "keyview filter sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.11" }, { "model": "keyview filter sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.10" }, { "model": "keyview filter sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10" }, { "model": "keyview export sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.4" }, { "model": "keyview export sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.3" }, { "model": "keyview export sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "9.2" }, { "model": "keyview export sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.9" }, { "model": "keyview export sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.8" }, { "model": "keyview export sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.5" }, { "model": "keyview export sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.12" }, { "model": "keyview export sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10.10" }, { "model": "keyview export sdk", "scope": "eq", "trust": 0.3, "vendor": "autonomy", "version": "10" }, { "model": "messaging gateway", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "9.5.1" }, { "model": "mail security for microsoft exchange", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "6.5.5" }, { "model": "mail security for microsoft exchange", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "6.0.12" }, { "model": "mail security for domino", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "8.0.8" }, { "model": "mail security for domino", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "7.5.11" }, { "model": "data loss prevention endpoint agents", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "11.1" }, { "model": "data loss prevention endpoint agents", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "10.5.3" }, { "model": "data loss prevention detection servers for windows", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "11.1" }, { "model": "data loss prevention detection servers for windows", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "10.5.3" }, { "model": "data loss prevention detection servers for linux", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "11.1" }, { "model": "data loss prevention detection servers for linux", "scope": "ne", "trust": 0.3, "vendor": "symantec", "version": "10.5.3" }, { "model": "keyview idol", "scope": "ne", "trust": 0.3, "vendor": "autonomy", "version": "10.13.1" } ], "sources": [ { "db": "CERT/CC", "id": "VU#126159" }, { "db": "BID", "id": "48013" }, { "db": "JVNDB", "id": "JVNDB-2011-001718" }, { "db": "JVNDB", "id": "JVNDB-2011-001933" }, { "db": "CNNVD", "id": "CNNVD-201106-004" }, { "db": "NVD", "id": "CVE-2011-0548" } ] }, "configurations": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/configurations#", "children": { "@container": "@list" }, "cpe_match": { "@container": "@list" }, "data": { "@container": "@list" }, "nodes": { "@container": "@list" } }, "data": [ { "CVE_data_version": "4.0", "nodes": [ { "cpe_match": [ { "cpe22Uri": "cpe:/a:autonomy:autonomy_keyview_idol", "vulnerable": true } ], "operator": "OR" } ] } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001718" } ] }, "credits": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/credits#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Secunia", "sources": [ { "db": "PACKETSTORM", "id": "102365" }, { "db": "PACKETSTORM", "id": "102187" }, { "db": "PACKETSTORM", "id": "101914" }, { "db": "PACKETSTORM", "id": "102081" }, { "db": "PACKETSTORM", "id": "115865" } ], "trust": 0.5 }, "cve": "CVE-2011-0548", "cvss": { "@context": { "cvssV2": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2" }, "cvssV3": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#" }, "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/" }, "severity": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/cvss/severity#" }, "@id": "https://www.variotdbs.pl/ref/cvss/severity" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" }, "@id": "https://www.variotdbs.pl/ref/sources" } }, "data": [ { "cvssV2": [ { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "nvd@nist.gov", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "CVE-2011-0548", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 1.8, "vectorString": "AV:N/AC:M/Au:N/C:C/I:C/A:C", "version": "2.0" }, { "acInsufInfo": null, "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "CARNEGIE MELLON", "availabilityImpact": "PARTIAL", "availabilityRequirement": "NOT DEFINED", "baseScore": 9.0, "collateralDamagePotential": "NOT DEFINED", "confidentialityImpact": "COMPLETE", "confidentialityRequirement": "NOT DEFINED", "enviromentalScore": 7.4, "exploitability": "FUNCTIONAL", "exploitabilityScore": 8.6, "id": "VU#126159", "impactScore": 9.5, "integrityImpact": "COMPLETE", "integrityRequirement": "NOT DEFINED", "obtainAllPrivilege": null, "obtainOtherPrivilege": null, "obtainUserPrivilege": null, "remediationLevel": "OFFICIAL FIX", "reportConfidence": "CONFIRMED", "severity": "HIGH", "targetDistribution": "NOT DEFINED", "trust": 0.8, "userInteractionRequired": null, "vector_string": "AV:N/AC:M/Au:N/C:C/I:C/A:P", "version": "2.0" }, { "accessComplexity": "MEDIUM", "accessVector": "NETWORK", "authentication": "NONE", "author": "VULHUB", "availabilityImpact": "COMPLETE", "baseScore": 9.3, "confidentialityImpact": "COMPLETE", "exploitabilityScore": 8.6, "id": "VHN-48493", "impactScore": 10.0, "integrityImpact": "COMPLETE", "severity": "HIGH", "trust": 0.1, "vectorString": "AV:N/AC:M/AU:N/C:C/I:C/A:C", "version": "2.0" } ], "cvssV3": [], "severity": [ { "author": "nvd@nist.gov", "id": "CVE-2011-0548", "trust": 1.0, "value": "HIGH" }, { "author": "CARNEGIE MELLON", "id": "VU#126159", "trust": 0.8, "value": "HIGH" }, { "author": "NVD", "id": "CVE-2011-0548", "trust": 0.8, "value": "High" }, { "author": "CNNVD", "id": "CNNVD-201106-004", "trust": 0.6, "value": "CRITICAL" }, { "author": "VULHUB", "id": "VHN-48493", "trust": 0.1, "value": "HIGH" } ] } ], "sources": [ { "db": "CERT/CC", "id": "VU#126159" }, { "db": "VULHUB", "id": "VHN-48493" }, { "db": "JVNDB", "id": "JVNDB-2011-001933" }, { "db": "CNNVD", "id": "CNNVD-201106-004" }, { "db": "NVD", "id": "CVE-2011-0548" } ] }, "description": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/description#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Buffer overflow in the Lotus Freelance Graphics PRZ file viewer in Autonomy KeyView, as used in Symantec Mail Security (SMS) 6.x through 8.x, Symantec Brightmail and Messaging Gateway before 9.5.1, and Symantec Data Loss Prevention (DLP) before 10.5.3 and 11.x before 11.1, allows remote attackers to cause a denial of service (application crash) or possibly execute arbitrary code via a crafted .prz file. NOTE: this may overlap CVE-2011-1217. Autonomy KeyView IDOL Contains multiple vulnerabilities in file decoding. Autonomy Provided by Autonomy KeyView IDOL Is 1000 A library that decodes the above file formats. IBM Lotus Notes , Lotus Domino , Symantec Mail Security , Hyland OnBase Used in such applications. Autonomy KeyView IDOL Contains multiple vulnerabilities in file decoding.Although the impact will vary depending on the application, service operation may be interrupted by opening a specially crafted file. (DoS) An attacker may be attacked or execute arbitrary code with user privileges. Autonomy KeyView Filter is prone to a buffer-overflow vulnerability because of a failure to properly bounds check user-supplied input. \nAn attacker can exploit this issue by enticing an unsuspecting victim to open a malicious file or email attachment. Failed exploit attempts will result in a denial-of-service condition. \nNOTE: This issue was previously discussed in BID 47962 (IBM Lotus Notes Attachment Handling Multiple Buffer Overflow Vulnerabilities) but has been given its own record to better document it. KeyView is a software package for exporting, converting and viewing files in various formats. \n\nFor more information:\nSA44820\n\nSOLUTION:\nDo not open documents from untrusted sources. \n\nFor more information:\nSA44820\n\nSuccessful exploitation requires the attachment content scanning\noption to be enabled. \n\nSOLUTION:\nDisable the attachment content scanning option. ----------------------------------------------------------------------\n\n\nAlerts when vulnerabilities pose a threat to your infrastructure\nThe enhanced reporting module of the Secunia Vulnerability Intelligence Manager (VIM) enables you to combine advisory and ticket information, and generate policy compliance statistics. Using your asset list preferences, customised notifications are issued as soon as a new vulnerability is discovered - a valuable tool for documenting mitigation strategies. \n\nFor more information see vulnerability #6 in:\nSA44624\n\nPlease see the vendor\u0027s advisory for the list for affected products. ----------------------------------------------------------------------\n\n\nJoin Secunia @ FIRST Conference, 12-17 June, Hilton Vienna, Austria\nSee to the presentation \"The Dynamics and Threats of End-Point Software Portfolios\" by Secunia\u0027s Research Analyst Director, Stefan Frei. \nRead more:\nhttp://conference.first.org/ \n\n\n----------------------------------------------------------------------\n\nTITLE:\nAutonomy KeyView File Processing Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA44820\n\nVERIFY ADVISORY:\nSecunia.com\nhttp://secunia.com/advisories/44820/\nCustomer Area (Credentials Required)\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44820\n\nRELEASE DATE:\n2011-06-08\n\nDISCUSS ADVISORY:\nhttp://secunia.com/advisories/44820/#comments\n\nAVAILABLE ON SITE AND IN CUSTOMER AREA:\n * Last Update\n * Popularity\n * Comments\n * Criticality Level\n * Impact\n * Where\n * Solution Status\n * Operating System / Software\n * CVE Reference(s)\n\nhttp://secunia.com/advisories/44820/\n\nONLY AVAILABLE IN CUSTOMER AREA:\n * Authentication Level\n * Report Reliability\n * Secunia PoC\n * Secunia Analysis\n * Systems Affected\n * Approve Distribution\n * Remediation Status\n * Secunia CVSS Score\n * CVSS\n\nhttps://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44820\n\nONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI:\n * AUTOMATED SCANNING\n\nhttp://secunia.com/vulnerability_scanning/personal/\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/\n\nDESCRIPTION:\nMultiple vulnerabilities have been reported in Autonomy KeyView,\nwhich can be exploited by malicious people to compromise a vulnerable\nsystem. \n\n1) An error when processing Windows Write (WRI) files can be\nexploited to cause a stack-based buffer overflow. \n\n2) Some errors when processing unspecified file formats can be\nexploited to corrupt memory. No further information is currently\navailable. \n\nThe vulnerabilities are reported in versions prior to 10.13.1. \n\nSOLUTION:\nUpdate to version 10.13.1. \n\nPROVIDED AND/OR DISCOVERED BY:\nWill Dormann and Jared Allar, CERT/CC. \n\nORIGINAL ADVISORY:\nUS-CERT (VU#126159):\nhttp://www.kb.cert.org/vuls/id/126159\n\nOTHER REFERENCES:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nDEEP LINKS:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED DESCRIPTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXTENDED SOLUTION:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\nEXPLOIT:\nFurther details available in Customer Area:\nhttp://secunia.com/vulnerability_intelligence/\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n", "sources": [ { "db": "NVD", "id": "CVE-2011-0548" }, { "db": "CERT/CC", "id": "VU#126159" }, { "db": "JVNDB", "id": "JVNDB-2011-001718" }, { "db": "JVNDB", "id": "JVNDB-2011-001933" }, { "db": "BID", "id": "48013" }, { "db": "VULHUB", "id": "VHN-48493" }, { "db": "PACKETSTORM", "id": "102365" }, { "db": "PACKETSTORM", "id": "102187" }, { "db": "PACKETSTORM", "id": "101914" }, { "db": "PACKETSTORM", "id": "102081" }, { "db": "PACKETSTORM", "id": "115865" } ], "trust": 3.87 }, "exploit_availability": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "reference": "https://www.kb.cert.org/vuls/id/126159", "trust": 0.8, "type": "unknown" } ], "sources": [ { "db": "CERT/CC", "id": "VU#126159" } ] }, "external_ids": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/external_ids#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "db": "NVD", "id": "CVE-2011-0548", "trust": 2.8 }, { "db": "SECUNIA", "id": "44779", "trust": 2.6 }, { "db": "SECTRACK", "id": "1025596", "trust": 2.5 }, { "db": "SECTRACK", "id": "1025594", "trust": 2.5 }, { "db": "SECTRACK", "id": "1025595", "trust": 2.5 }, { "db": "CERT/CC", "id": "VU#126159", "trust": 2.3 }, { "db": "BID", "id": "48013", "trust": 1.1 }, { "db": "JVNDB", "id": "JVNDB-2011-001718", "trust": 0.8 }, { "db": "JVNDB", "id": "JVNDB-2011-001933", "trust": 0.8 }, { "db": "CNNVD", "id": "CNNVD-201106-004", "trust": 0.7 }, { "db": "MCAFEE", "id": "SB10024", "trust": 0.4 }, { "db": "SECUNIA", "id": "50399", "trust": 0.3 }, { "db": "SECUNIA", "id": "44877", "trust": 0.2 }, { "db": "SECUNIA", "id": "44878", "trust": 0.2 }, { "db": "SECUNIA", "id": "44820", "trust": 0.2 }, { "db": "VULHUB", "id": "VHN-48493", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "102365", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "102187", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "101914", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "102081", "trust": 0.1 }, { "db": "PACKETSTORM", "id": "115865", "trust": 0.1 } ], "sources": [ { "db": "CERT/CC", "id": "VU#126159" }, { "db": "VULHUB", "id": "VHN-48493" }, { "db": "BID", "id": "48013" }, { "db": "JVNDB", "id": "JVNDB-2011-001718" }, { "db": "JVNDB", "id": "JVNDB-2011-001933" }, { "db": "PACKETSTORM", "id": "102365" }, { "db": "PACKETSTORM", "id": "102187" }, { "db": "PACKETSTORM", "id": "101914" }, { "db": "PACKETSTORM", "id": "102081" }, { "db": "PACKETSTORM", "id": "115865" }, { "db": "CNNVD", "id": "CNNVD-201106-004" }, { "db": "NVD", "id": "CVE-2011-0548" } ] }, "id": "VAR-201107-0115", "iot": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/iot#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": true, "sources": [ { "db": "VULHUB", "id": "VHN-48493" } ], "trust": 0.6 }, "last_update_date": "2024-11-23T19:38:15.704000Z", "patch": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/patch#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "title": "KeyView IDOL \u0026 Connectors", "trust": 0.8, "url": "http://www.autonomy.com/content/Products/idol-modules-connectors/index.en.html" }, { "title": "Information Connectivity", "trust": 0.8, "url": "http://www.autonomy.com/content/Technology/idol-functionality-information-connectivity/index.en.html" }, { "title": "Autonomy Support Site", "trust": 0.8, "url": "https://customers.autonomy.com/" }, { "title": "SYM11-007", "trust": 0.8, "url": "http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2011\u0026suid=20110531_00" }, { "title": "SYM11-007", "trust": 0.8, "url": "http://www.symantec.com/ja/jp/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2011\u0026suid=20110531_00" } ], "sources": [ { "db": "JVNDB", "id": "JVNDB-2011-001718" }, { "db": "JVNDB", "id": "JVNDB-2011-001933" } ] }, "problemtype_data": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "problemtype": "CWE-119", "trust": 1.9 } ], "sources": [ { "db": "VULHUB", "id": "VHN-48493" }, { "db": "JVNDB", "id": "JVNDB-2011-001933" }, { "db": "NVD", "id": "CVE-2011-0548" } ] }, "references": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/references#", "data": { "@container": "@list" }, "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": [ { "trust": 2.5, "url": "http://securitytracker.com/id?1025594" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1025595" }, { "trust": 2.5, "url": "http://securitytracker.com/id?1025596" }, { "trust": 2.5, "url": "http://secunia.com/advisories/44779" }, { "trust": 1.5, "url": "http://www.kb.cert.org/vuls/id/126159" }, { "trust": 1.0, "url": "http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2011\u0026suid=20110531_00" }, { "trust": 1.0, "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2011\u0026suid=20110531_00" }, { "trust": 0.8, "url": "http://www.autonomy.com/content/products/idol-modules-connectors/index.en.html" }, { "trust": 0.8, "url": "http://www.autonomy.com/content/technology/idol-functionality-information-connectivity/index.en.html" }, { "trust": 0.8, "url": "https://customers.autonomy.com" }, { "trust": 0.8, "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026suid=20111006_00" }, { "trust": 0.8, "url": "http://jvn.jp/cert/jvnvu126159" }, { "trust": 0.8, "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2011-0548" }, { "trust": 0.8, "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2011-0548" }, { "trust": 0.8, "url": "http://www.securityfocus.com/bid/48013" }, { "trust": 0.5, "url": "http://secunia.com/advisories/secunia_security_advisories/" }, { "trust": 0.5, "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/" }, { "trust": 0.5, "url": "http://secunia.com/vulnerability_scanning/personal/" }, { "trust": 0.5, "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org" }, { "trust": 0.5, "url": "http://secunia.com/advisories/about_secunia_advisories/" }, { "trust": 0.4, "url": "https://kc.mcafee.com/corporate/index?page=content\u0026id=sb10024" }, { "trust": 0.4, "url": "http://secunia.com/vulnerability_intelligence/" }, { "trust": 0.3, "url": "http://www-01.ibm.com/software/lotus/products/notes/" }, { "trust": 0.3, "url": "http://www.autonomy.com/content/products/keyview/index.en.html" }, { "trust": 0.3, "url": "https://www-304.ibm.com/support/docview.wss?uid=swg21500034" }, { "trust": 0.3, "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=913" }, { "trust": 0.3, "url": "http://conference.first.org/" }, { "trust": 0.1, "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026amp;pvid=security_advisory\u0026amp;year=2011\u0026amp;suid=20110531_00" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44877/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44877/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44877" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44878" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44878/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44878/#comments" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44779" }, { "trust": 0.1, "url": "http://secunia.com/products/corporate/evm/" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44779/" }, { "trust": 0.1, "url": "http://www.youtube.com/user/secunia#p/a/u/0/m1y9sjqr2sy" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44779/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44820/#comments" }, { "trust": 0.1, "url": "http://secunia.com/advisories/44820/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=44820" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50399/" }, { "trust": 0.1, "url": "https://ca.secunia.com/?page=viewadvisory\u0026vuln_id=50399" }, { "trust": 0.1, "url": "http://secunia.com/csi6beta" }, { "trust": 0.1, "url": "http://secunia.com/advisories/50399/#comments" } ], "sources": [ { "db": "CERT/CC", "id": "VU#126159" }, { "db": "VULHUB", "id": "VHN-48493" }, { "db": "BID", "id": "48013" }, { "db": "JVNDB", "id": "JVNDB-2011-001718" }, { "db": "JVNDB", "id": "JVNDB-2011-001933" }, { "db": "PACKETSTORM", "id": "102365" }, { "db": "PACKETSTORM", "id": "102187" }, { "db": "PACKETSTORM", "id": "101914" }, { "db": "PACKETSTORM", "id": "102081" }, { "db": "PACKETSTORM", "id": "115865" }, { "db": "CNNVD", "id": "CNNVD-201106-004" }, { "db": "NVD", "id": "CVE-2011-0548" } ] }, "sources": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#", "data": { "@container": "@list" } }, "data": [ { "db": "CERT/CC", "id": "VU#126159" }, { "db": "VULHUB", "id": "VHN-48493" }, { "db": "BID", "id": "48013" }, { "db": "JVNDB", "id": "JVNDB-2011-001718" }, { "db": "JVNDB", "id": "JVNDB-2011-001933" }, { "db": "PACKETSTORM", "id": "102365" }, { "db": "PACKETSTORM", "id": "102187" }, { "db": "PACKETSTORM", "id": "101914" }, { "db": "PACKETSTORM", "id": "102081" }, { "db": "PACKETSTORM", "id": "115865" }, { "db": "CNNVD", "id": "CNNVD-201106-004" }, { "db": "NVD", "id": "CVE-2011-0548" } ] }, "sources_release_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2011-06-07T00:00:00", "db": "CERT/CC", "id": "VU#126159" }, { "date": "2011-07-18T00:00:00", "db": "VULHUB", "id": "VHN-48493" }, { "date": "2011-05-24T00:00:00", "db": "BID", "id": "48013" }, { "date": "2011-06-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001718" }, { "date": "2011-07-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001933" }, { "date": "2011-06-17T04:44:22", "db": "PACKETSTORM", "id": "102365" }, { "date": "2011-06-12T08:47:41", "db": "PACKETSTORM", "id": "102187" }, { "date": "2011-06-01T04:21:47", "db": "PACKETSTORM", "id": "101914" }, { "date": "2011-06-08T02:09:27", "db": "PACKETSTORM", "id": "102081" }, { "date": "2012-08-24T05:43:31", "db": "PACKETSTORM", "id": "115865" }, { "date": "2011-06-03T00:00:00", "db": "CNNVD", "id": "CNNVD-201106-004" }, { "date": "2011-07-18T22:55:00.860000", "db": "NVD", "id": "CVE-2011-0548" } ] }, "sources_update_date": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#", "data": { "@container": "@list" } }, "data": [ { "date": "2012-06-04T00:00:00", "db": "CERT/CC", "id": "VU#126159" }, { "date": "2013-02-07T00:00:00", "db": "VULHUB", "id": "VHN-48493" }, { "date": "2015-03-19T08:17:00", "db": "BID", "id": "48013" }, { "date": "2011-06-20T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001718" }, { "date": "2011-07-26T00:00:00", "db": "JVNDB", "id": "JVNDB-2011-001933" }, { "date": "2011-07-19T00:00:00", "db": "CNNVD", "id": "CNNVD-201106-004" }, { "date": "2024-11-21T01:24:16.130000", "db": "NVD", "id": "CVE-2011-0548" } ] }, "threat_type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/threat_type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "remote", "sources": [ { "db": "CNNVD", "id": "CNNVD-201106-004" } ], "trust": 0.6 }, "title": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/title#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "Autonomy Keyview IDOL contains multiple vulnerabilities in file parsers", "sources": [ { "db": "CERT/CC", "id": "VU#126159" } ], "trust": 0.8 }, "type": { "@context": { "@vocab": "https://www.variotdbs.pl/ref/type#", "sources": { "@container": "@list", "@context": { "@vocab": "https://www.variotdbs.pl/ref/sources#" } } }, "data": "buffer overflow", "sources": [ { "db": "CNNVD", "id": "CNNVD-201106-004" } ], "trust": 0.6 } }
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.