{"vuid":"VU#276563","idnumber":"276563","name":"Autonomy KeyView SDK buffer overflow vulnerability","keywords":["Symantec","KeyView Module","Buffer Overflow","DoS","denial of service"],"overview":"Autonomy KeyView SDK contains a buffer overflow vulnerability that may allow an attacker to execute arbitrary code.","clean_desc":"Autonomy KeyView SDK is a commercial software development kit (SDK) that includes file filtering libraries. A vulnerability exists in the way the SDK libraries process specially crafted WordPerfect documents. According to iDefense: This vulnerability exists within the \"wp6sr.dll,\" which implements the processing of WordPerfect documents. When processing certain records, data is copied from the file into a fixed-size stack buffer without ensuring that enough space is available. By overflowing the buffer, an attacker can overwrite control flow structures stored on the stack. Note that this issue affects products that use Autonomy KeyView SDK. These include IBM Lotus Notes and Symantec products.","impact":"An unauthenticated attacker may be able to execute arbitrary code or cause a vulnerable system to crash.","resolution":"Apply updates Developers should contact  Autonomy KeyView support for information on how to obtain updated software that addresses this issue. IBM Lotus Notes has released an alert to address this issue. Symantec has released SYM09-004 to address this issue.","workarounds":"","sysaffected":"","thanks":"This issue was made public by \niDefense","author":"This document was written by Chris Taschner.","public":["http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=774","https://customers.autonomy.com/support/login.jsp?notLoggedIn=true&origURL=%2Fsecure%2Fdocs%2FUpdates%2FKeyview%2FFilter+SDK%2F10.4%2Fkv_update_nti40_10.4.zip.readme.html","http://www-01.ibm.com/support/docview.wss?uid=swg21377573","http://secunia.com/advisories/34307/","http://securityresponse.symantec.com/avcenter/security/Content/2009.03.17a.html","http://secunia.com/advisories/34318/"],"cveids":["CVE-2008-4564"],"certadvisory":"","uscerttechnicalalert":null,"datecreated":"2009-03-18T11:50:36Z","publicdate":"2009-03-17T00:00:00Z","datefirstpublished":"2009-03-19T18:06:43Z","dateupdated":"2009-04-30T18:30:23Z","revision":10,"vrda_d1_directreport":"0","vrda_d1_population":"3","vrda_d1_impact":"3","cam_widelyknown":"15","cam_exploitation":"0","cam_internetinfrastructure":"5","cam_population":"10","cam_impact":"20","cam_easeofexploitation":"4","cam_attackeraccessrequired":"20","cam_scorecurrent":"6","cam_scorecurrentwidelyknown":"7.5","cam_scorecurrentwidelyknownexploited":"13.5","ipprotocol":"","cvss_accessvector":"--","cvss_accesscomplexity":"--","cvss_authentication":null,"cvss_confidentialityimpact":"--","cvss_integrityimpact":"--","cvss_availabilityimpact":"--","cvss_exploitablity":null,"cvss_remediationlevel":"Not Defined (ND)","cvss_reportconfidence":"Not Defined (ND)","cvss_collateraldamagepotential":"Not Defined (ND)","cvss_targetdistribution":"Not Defined (ND)","cvss_securityrequirementscr":"Not Defined (ND)","cvss_securityrequirementsir":"Not Defined (ND)","cvss_securityrequirementsar":"Not Defined (ND)","cvss_basescore":"0","cvss_basevector":"AV:--/AC:--/Au:--/C:--/I:--/A:--","cvss_temporalscore":"0","cvss_environmentalscore":"0","cvss_environmentalvector":"CDP:Not Defined (ND)/TD:Not Defined (ND)/CR:Not Defined (ND)/IR:Not Defined (ND)/AR:Not Defined (ND)","metric":6.0,"vulnote":null}