Lucene search

K
nvd[email protected]NVD:CVE-2008-4564
HistoryMar 18, 2009 - 3:30 p.m.

CVE-2008-4564

2009-03-1815:30:00
CWE-119
web.nvd.nist.gov
1

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.6 High

AI Score

Confidence

Low

0.933 High

EPSS

Percentile

99.1%

Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file.

Affected configurations

NVD
Node
autonomykeyview_export_sdkRange10.4
OR
autonomykeyview_export_sdkMatch2.0
OR
autonomykeyview_export_sdkMatch9.2.0
OR
autonomykeyview_export_sdkMatch10
OR
autonomykeyview_export_sdkMatch10.3
OR
autonomykeyview_filter_sdkRange10.4
OR
autonomykeyview_filter_sdkMatch2.0
OR
autonomykeyview_filter_sdkMatch9.2.0
OR
autonomykeyview_filter_sdkMatch10
OR
autonomykeyview_filter_sdkMatch10.3
OR
autonomykeyview_viewer_sdkRange10.4
OR
autonomykeyview_viewer_sdkMatch2.0
OR
autonomykeyview_viewer_sdkMatch9.2.0
OR
autonomykeyview_viewer_sdkMatch10
OR
autonomykeyview_viewer_sdkMatch10.3
OR
ibmlotus_notesMatch5.0.3
OR
ibmlotus_notesMatch5.0.12
OR
ibmlotus_notesMatch6.0
OR
ibmlotus_notesMatch6.0.1
OR
ibmlotus_notesMatch6.0.2
OR
ibmlotus_notesMatch6.0.3
OR
ibmlotus_notesMatch6.0.4
OR
ibmlotus_notesMatch6.0.5
OR
ibmlotus_notesMatch6.5
OR
ibmlotus_notesMatch6.5.1
OR
ibmlotus_notesMatch6.5.2
OR
ibmlotus_notesMatch6.5.3
OR
ibmlotus_notesMatch6.5.4
OR
ibmlotus_notesMatch6.5.5
OR
ibmlotus_notesMatch6.5.5fp2
OR
ibmlotus_notesMatch6.5.5fp3
OR
ibmlotus_notesMatch6.5.6
OR
ibmlotus_notesMatch6.5.6fp2
OR
ibmlotus_notesMatch7.0
OR
ibmlotus_notesMatch7.0.1
OR
ibmlotus_notesMatch7.0.2
OR
ibmlotus_notesMatch7.0.2fp1
OR
ibmlotus_notesMatch7.0.3
OR
ibmlotus_notesMatch8.0
OR
symantecaltiris_deployment_solution
OR
symantecbrightmailMatch5.0appliance
OR
symantecdata_loss_prevention_detection_serversMatch7.0
OR
symantecdata_loss_prevention_detection_serversMatch8.0
OR
symantecdata_loss_prevention_detection_serversMatch8.1linux
OR
symantecdata_loss_prevention_detection_serversMatch8.1windows
OR
symantecdata_loss_prevention_endpoint_agentsMatch8.0
OR
symantecdata_loss_prevention_endpoint_agentsMatch8.1
OR
symantecenforceMatch7.0
OR
symantecenforceMatch8.0
OR
symantecenforceMatch8.1linux
OR
symantecenforceMatch8.1windows
OR
symantecmail_securityMatch5.0appliance
OR
symantecmail_securityMatch5.0.0
OR
symantecmail_securityMatch5.0.0smtp
OR
symantecmail_securityMatch5.0.0.24appliance
OR
symantecmail_securityMatch5.0.1smtp
OR
symantecmail_securityMatch5.0.1.181smtp
OR
symantecmail_securityMatch5.0.1.182smtp
OR
symantecmail_securityMatch5.0.1.189smtp
OR
symantecmail_securityMatch5.0.1.200smtp
OR
symantecmail_securityMatch5.0.10microsoft_exchange
OR
symantecmail_securityMatch5.0.11microsoft_exchange
OR
symantecmail_securityMatch6.0.6microsoft_exchange
OR
symantecmail_securityMatch6.0.7microsoft_exchange
OR
symantecmail_securityMatch7.5..4.29domino
OR
symantecmail_securityMatch7.5.3.25domino
OR
symantecmail_securityMatch7.5.5.32domino

9.3 High

CVSS2

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

COMPLETE

Integrity Impact

COMPLETE

Availability Impact

COMPLETE

AV:N/AC:M/Au:N/C:C/I:C/A:C

7.6 High

AI Score

Confidence

Low

0.933 High

EPSS

Percentile

99.1%