var-201003-0114
Vulnerability from variot

Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow. Autonomy KeyView module is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers. Exploiting this issue will allow an attacker to corrupt memory and cause denial-of-service conditions and may potentially allow the execution of arbitrary code in the context of an application using the module. Multiple products using the KeyView module are affected, including: Symantec Mail Security for Domino Symantec Mail Security for Microsoft Exchange Symantec Mail Security for SMTP Symantec Brightmail Gateway Symantec Data Loss Prevention Detection Servers Symantec Data Loss Prevention Endpoint Agents Symantec IM Manager. KeyView is a software package for exporting, converting and viewing files in various formats.

For more information: SA38797

SOLUTION: Please see the vendor's advisory for a list of fixes. iDefense Security Advisory 03.04.10 http://labs.idefense.com/intelligence/vulnerabilities/ Mar 04, 2010

I. BACKGROUND

Autonomy KeyView SDK is a commercial SDK that provides many file format parsing libraries. It supports a large number of different document formats. KeyView is used by several popular vendors for processing documents. For more information, visit the URLs referenced below.

http://www.autonomy.com/

II.

This vulnerability occurs when processing specially crafted documents. When processing such a document, the software reads an integer value from the file and uses this integer, without validation, in an arithmetic operation to calculate the amount of memory to allocate. If a sufficiently large number is supplied, the calculation overflows, resulting in a buffer of insufficient size being allocated. The software then proceeds to copy data into this under-sized buffer. This results in an exploitable heap buffer overflow condition.

III. ANALYSIS

Exploitation of this vulnerability results in the execution of arbitrary code with the privileges of the targeted application. In order to exploit this vulnerability, an attacker must cause a specially crafted OLE file to be processed by an application using the Autonomy KeyView SDK. This includes file types such as PowerPoint, Excel, Word, as well as other document formats.

The amount of user interaction required is tied to the way in which the KeyView SDK is used. In cases such as Lotus Notes, this requires that an attacker convince a user to view an e-mail attachment; however, in other cases, processing may take place automatically as a document is examined.

The privileges that an attacker gains may be different for each application that uses the KeyView SDK. For example, exploiting this issue via Lotus Notes yields the current user's privileges while exploiting the vulnerability via Symantec Mail Security yields SYSTEM privileges.

IV. All applications that utilize Autonomy's KeyView SDK to process untrusted content are also believed to be vulnerable.

V. WORKAROUND

For Symantec Mail Security, disabling "content filtering" will prevent exploitation.

Unfortunately, disabling the affected "kvolefio.dll" library causes additional issues. Working around this issue by disabling filters would require all filters that utilize this module to be disabled. It is not clear at this time if this is even possible. iDefense will update this workaround once more information has been received from the vendor(s).

VI. VENDOR RESPONSE

Symantec Corporation has released a solution which addresses this issue. Information about downloadable vendor updates can be found by clicking on the URLs shown. http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=2010&suid=20100304_00

VII. CVE INFORMATION

The Common Vulnerabilities and Exposures (CVE) project has assigned the name CVE-2009-3032 to this issue. This is a candidate for inclusion in the CVE list (http://cve.mitre.org/), which standardizes names for security problems.

VIII. DISCLOSURE TIMELINE

09/28/2009 Initial Vendor Notification 09/28/2009 Initial Vendor Reply 03/04/2010 Coordinated Public Disclosure

IX. CREDIT

This vulnerability was discovered by Joshua J. Drake of iDefense Labs.

Get paid for vulnerability research http://labs.idefense.com/methodology/vulnerability/vcp.php

Free tools, research and upcoming events http://labs.idefense.com/

X. LEGAL NOTICES

Copyright \xa9 2010 iDefense, Inc.

Permission is granted for the redistribution of this alert electronically. It may not be edited in any way without the express written consent of iDefense. If you wish to reprint the whole or any part of this alert in any other medium other than electronically, please e-mail customerservice@idefense.com for permission.

Disclaimer: The information in the advisory is believed to be accurate at the time of publishing based on currently available information. Use of the information constitutes acceptance for use in an AS IS condition. There are no warranties with regard to this information. Neither the author nor the publisher accepts any liability for any direct, indirect, or consequential loss or damage arising from use of, or reliance on, this information. ----------------------------------------------------------------------

Use WSUS to deploy 3rd party patches

Public BETA http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/


TITLE: Autonomy KeyView OLE File Parsing Integer Overflow Vulnerability

SECUNIA ADVISORY ID: SA38797

VERIFY ADVISORY: http://secunia.com/advisories/38797/

DESCRIPTION: iDefense Labs has reported a vulnerability in Autonomy KeyView, which can be exploited by malicious people to compromise a vulnerable system.

The vulnerability is reported in version 10.5. Other versions may also be affected.

SOLUTION: Do not open OLE files in applications using the vulnerable library.

ORIGINAL ADVISORY: iDefense Labs: http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=858


About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-201003-0114",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "data loss prevention endpoint agents",
        "scope": "eq",
        "trust": 2.7,
        "vendor": "symantec",
        "version": "10.0"
      },
      {
        "model": "data loss prevention endpoint agents",
        "scope": "eq",
        "trust": 2.4,
        "vendor": "symantec",
        "version": "8.1.1"
      },
      {
        "model": "data loss prevention detection servers",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "8.1.1"
      },
      {
        "model": "data loss prevention detection servers",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "9.0.1"
      },
      {
        "model": "data loss prevention detection servers",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "10.0"
      },
      {
        "model": "data loss prevention endpoint agents",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "symantec",
        "version": "9.0.1"
      },
      {
        "model": "brightmail gateway",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "symantec",
        "version": "8.0"
      },
      {
        "model": "lotus notes",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "8.5"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "6.0.6"
      },
      {
        "model": "im manager 2007",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "*"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "7.5.4.29"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "7.5.7"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "7.5.8"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "5.0.12"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "5.0.13"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "8.0"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "7.5.6"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "5.0.1.181"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "6.0.7"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "8.0.1"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "7.5.3.25"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "8.0.2"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "5.0.1.182"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "5.0.0"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "5.0.1.189"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "6.0.8"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "7.5.5.32"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "symantec",
        "version": "5.0.11"
      },
      {
        "model": "notes",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "6.5.x"
      },
      {
        "model": "notes",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "7.x"
      },
      {
        "model": "notes",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "8.0.2 fp4"
      },
      {
        "model": "notes",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "8.5.1 fp1"
      },
      {
        "model": "notes",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "8.5.2"
      },
      {
        "model": "brightmail gateway",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "8.x"
      },
      {
        "model": "data loss prevention endpoint agents",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "9.x"
      },
      {
        "model": "data loss prevention enforce/detection servers",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(linux) 10.0"
      },
      {
        "model": "data loss prevention enforce/detection servers",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(linux) 8.1.1"
      },
      {
        "model": "data loss prevention enforce/detection servers",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(linux) 9.x"
      },
      {
        "model": "data loss prevention enforce/detection servers",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(windows) 10.0"
      },
      {
        "model": "data loss prevention enforce/detection servers",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(windows) 8.1.1"
      },
      {
        "model": "data loss prevention enforce/detection servers",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(windows) 9.x"
      },
      {
        "model": "im manager 2007",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "8.x"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(domino) 7.5.3.25"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(domino) 7.5.4.29"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(domino) 7.5.5.32"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(domino) 7.5.6"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(domino) 7.5.7"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(domino) 7.5.8"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(domino) 8.0"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(domino) 8.0.1"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(domino) 8.0.2"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(exchange) 5.0.10"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(exchange) 5.0.11"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(exchange) 5.0.12"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(exchange) 5.0.13"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(exchange) 6.0.6"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(exchange) 6.0.7"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(exchange) 6.0.8"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(exchange) 6.0.9"
      },
      {
        "model": "mail security",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "symantec",
        "version": "(smtp) (eol) 5.0.x"
      },
      {
        "model": "im manager 2007",
        "scope": null,
        "trust": 0.6,
        "vendor": "symantec",
        "version": null
      },
      {
        "model": "mail security for smtp patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.1205"
      },
      {
        "model": "mail security for smtp patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.1201"
      },
      {
        "model": "mail security for smtp patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.1200"
      },
      {
        "model": "mail security for smtp patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.1189"
      },
      {
        "model": "mail security for smtp patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.1182"
      },
      {
        "model": "mail security for smtp patch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.1181"
      },
      {
        "model": "mail security for smtp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.1"
      },
      {
        "model": "mail security for smtp",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0"
      },
      {
        "model": "mail security for microsoft exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "6.0.9"
      },
      {
        "model": "mail security for microsoft exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "6.0.8"
      },
      {
        "model": "mail security for microsoft exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "6.0.7"
      },
      {
        "model": "mail security for microsoft exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "6.0.6"
      },
      {
        "model": "mail security for microsoft exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.13"
      },
      {
        "model": "mail security for microsoft exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.12"
      },
      {
        "model": "mail security for microsoft exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.11"
      },
      {
        "model": "mail security for microsoft exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.10.382"
      },
      {
        "model": "mail security for microsoft exchange",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "5.0.10"
      },
      {
        "model": "mail security for domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.0.2"
      },
      {
        "model": "mail security for domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.0.1"
      },
      {
        "model": "mail security for domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "7.5.8"
      },
      {
        "model": "mail security for domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "7.5.7"
      },
      {
        "model": "mail security for domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "7.5.6"
      },
      {
        "model": "mail security for domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "7.5.325"
      },
      {
        "model": "mail security for domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.0"
      },
      {
        "model": "mail security for domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "7.5.5.32"
      },
      {
        "model": "mail security for domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "7.5.4.29"
      },
      {
        "model": "mail security for domino",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "7.5.3.25"
      },
      {
        "model": "im manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.4"
      },
      {
        "model": "im manager",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.3"
      },
      {
        "model": "data loss prevention endpoint agents",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "9.0.2"
      },
      {
        "model": "data loss prevention endpoint agents",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.1"
      },
      {
        "model": "data loss prevention detection servers for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "9.0.2"
      },
      {
        "model": "data loss prevention detection servers for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.1.1"
      },
      {
        "model": "data loss prevention detection servers for windows",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "10.0"
      },
      {
        "model": "data loss prevention detection servers for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "9.0.2"
      },
      {
        "model": "data loss prevention detection servers for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.1.1"
      },
      {
        "model": "data loss prevention detection servers for linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "10.0"
      },
      {
        "model": "data loss prevention detection servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "7.237"
      },
      {
        "model": "data loss prevention detection servers",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "7.2"
      },
      {
        "model": "brightmail gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.0.2"
      },
      {
        "model": "brightmail gateway",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.0.1"
      },
      {
        "model": "mail security for microsoft exchange",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "6.0.10"
      },
      {
        "model": "mail security for domino",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.0.3"
      },
      {
        "model": "mail security for domino",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "7.5.9"
      },
      {
        "model": "im manager",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.4.13"
      },
      {
        "model": "data loss prevention endpoint agents",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "10.0.1010.18007"
      },
      {
        "model": "data loss prevention endpoint agents",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.1.10.9"
      },
      {
        "model": "data loss prevention endpoint agents",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "9.0.3"
      },
      {
        "model": "data loss prevention detection servers for windows",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "10.0.1010.18007"
      },
      {
        "model": "data loss prevention detection servers for windows",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "9.0.3"
      },
      {
        "model": "data loss prevention detection servers for windows",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.1.10.8"
      },
      {
        "model": "data loss prevention detection servers for linux",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "10.0.1010.18007"
      },
      {
        "model": "data loss prevention detection servers for linux",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "9.0.3"
      },
      {
        "model": "data loss prevention detection servers for linux",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "8.1.10.8"
      },
      {
        "model": "data loss prevention detection servers",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "7.2.40"
      },
      {
        "model": "brightmail gateway",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "symantec",
        "version": "9.0"
      }
    ],
    "sources": [
      {
        "db": "BID",
        "id": "38468"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201003-053"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3032"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:ibm:notes",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:symantec:brightmail_gateway",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:symantec:data_loss_prevention_endpoint_agents",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:symantec:data_loss_prevention_detection_servers",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:symantec:im_manager_2007",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:symantec:mail_security",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Joshua J. Drake",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201003-053"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2009-3032",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2009-3032",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-40478",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2009-3032",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2009-3032",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-201003-053",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-40478",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-40478"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201003-053"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3032"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Integer overflow in kvolefio.dll 8.5.0.8339 and 10.5.0.0 in the Autonomy KeyView Filter SDK, as used in IBM Lotus Notes 8.5, Symantec Mail Security for Microsoft Exchange 5.0.10 through 5.0.13, and other products, allows context-dependent attackers to execute arbitrary code via a crafted OLE document that triggers a heap-based buffer overflow. Autonomy KeyView module is prone to a buffer-overflow vulnerability because it fails to perform adequate boundary checks on user-supplied data before copying it to insufficiently sized buffers. \nExploiting this issue will allow an attacker to corrupt memory and cause denial-of-service conditions and may potentially allow the execution of arbitrary code in the context of an application using the module. \nMultiple products using the KeyView module are affected, including:\nSymantec Mail Security for Domino\nSymantec Mail Security for Microsoft Exchange\nSymantec Mail Security for SMTP\nSymantec Brightmail Gateway\nSymantec Data Loss Prevention Detection Servers\nSymantec Data Loss Prevention Endpoint Agents\nSymantec IM Manager. KeyView is a software package for exporting, converting and viewing files in various formats. \n\nFor more information:\nSA38797\n\nSOLUTION:\nPlease see the vendor\u0027s advisory for a list of fixes. iDefense Security Advisory 03.04.10\nhttp://labs.idefense.com/intelligence/vulnerabilities/\nMar 04, 2010\n\nI. BACKGROUND\n\nAutonomy KeyView SDK is a commercial SDK that provides many file format\nparsing libraries. It supports a large number of different document\nformats. KeyView is used by several popular vendors for processing\ndocuments. For more information, visit the URLs referenced below. \n\nhttp://www.autonomy.com/\n\nII. \n\nThis vulnerability occurs when processing specially crafted documents. \nWhen processing such a document, the software reads an integer value\nfrom the file and uses this integer, without validation, in an\narithmetic operation to calculate the amount of memory to allocate. If\na sufficiently large number is supplied, the calculation overflows,\nresulting in a buffer of insufficient size being allocated. The\nsoftware then proceeds to copy data into this under-sized buffer. This\nresults in an exploitable heap buffer overflow condition. \n\nIII. ANALYSIS\n\nExploitation of this vulnerability results in the execution of arbitrary\ncode with the privileges of the targeted application. In order to\nexploit this vulnerability, an attacker must cause a specially crafted\nOLE file to be processed by an application using the Autonomy KeyView\nSDK. This includes file types such as PowerPoint, Excel, Word, as well\nas other document formats. \n\nThe amount of user interaction required is tied to the way in which the\nKeyView SDK is used. In cases such as Lotus Notes, this requires that\nan attacker convince a user to view an e-mail attachment; however, in\nother cases, processing may take place automatically as a document is\nexamined. \n\nThe privileges that an attacker gains may be different for each\napplication that uses the KeyView SDK. For example, exploiting this\nissue via Lotus Notes yields the current user\u0027s privileges while\nexploiting the vulnerability via Symantec Mail Security yields SYSTEM\nprivileges. \n\nIV. All applications that utilize\nAutonomy\u0027s KeyView SDK to process untrusted content are also believed\nto be vulnerable. \n\nV. WORKAROUND\n\nFor Symantec Mail Security, disabling \"content filtering\" will prevent\nexploitation. \n\nUnfortunately, disabling the affected \"kvolefio.dll\" library causes\nadditional issues. Working around this issue by disabling filters would\nrequire all filters that utilize this module to be disabled. It is not\nclear at this time if this is even possible. iDefense will update this\nworkaround once more information has been received from the vendor(s). \n\nVI. VENDOR RESPONSE\n\nSymantec Corporation has released a solution which addresses this issue. \nInformation about downloadable vendor updates can be found by clicking\non the URLs shown. \nhttp://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100304_00\n\nVII. CVE INFORMATION\n\nThe Common Vulnerabilities and Exposures (CVE) project has assigned the\nname CVE-2009-3032 to this issue. This is a candidate for inclusion in\nthe CVE list (http://cve.mitre.org/), which standardizes names for\nsecurity problems. \n\nVIII. DISCLOSURE TIMELINE\n\n09/28/2009  Initial Vendor Notification\n09/28/2009  Initial Vendor Reply\n03/04/2010  Coordinated Public Disclosure\n\nIX. CREDIT\n\nThis vulnerability was discovered by Joshua J. Drake of iDefense Labs. \n\nGet paid for vulnerability research\nhttp://labs.idefense.com/methodology/vulnerability/vcp.php\n\nFree tools, research and upcoming events\nhttp://labs.idefense.com/\n\nX. LEGAL NOTICES\n\nCopyright \\xa9 2010 iDefense, Inc. \n\nPermission is granted for the redistribution of this alert\nelectronically. It may not be edited in any way without the express\nwritten consent of iDefense. If you wish to reprint the whole or any\npart of this alert in any other medium other than electronically,\nplease e-mail customerservice@idefense.com for permission. \n\nDisclaimer: The information in the advisory is believed to be accurate\nat the time of publishing based on currently available information. Use\nof the information constitutes acceptance for use in an AS IS condition. \n There are no warranties with regard to this information. Neither the\nauthor nor the publisher accepts any liability for any direct,\nindirect, or consequential loss or damage arising from use of, or\nreliance on, this information. ----------------------------------------------------------------------\n\n\nUse WSUS to deploy 3rd party patches\n\nPublic BETA\nhttp://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/\n\n\n----------------------------------------------------------------------\n\nTITLE:\nAutonomy KeyView OLE File Parsing Integer Overflow Vulnerability\n\nSECUNIA ADVISORY ID:\nSA38797\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/38797/\n\nDESCRIPTION:\niDefense Labs has reported a vulnerability in Autonomy KeyView, which\ncan be exploited by malicious people to compromise a vulnerable\nsystem. \n\nThe vulnerability is reported in version 10.5. Other versions may\nalso be affected. \n\nSOLUTION:\nDo not open OLE files in applications using the vulnerable library. \n\nORIGINAL ADVISORY:\niDefense Labs:\nhttp://labs.idefense.com/intelligence/vulnerabilities/display.php?id=858\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\nprivate users keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2009-3032"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      },
      {
        "db": "BID",
        "id": "38468"
      },
      {
        "db": "VULHUB",
        "id": "VHN-40478"
      },
      {
        "db": "PACKETSTORM",
        "id": "86952"
      },
      {
        "db": "PACKETSTORM",
        "id": "86956"
      },
      {
        "db": "PACKETSTORM",
        "id": "86946"
      },
      {
        "db": "PACKETSTORM",
        "id": "86954"
      }
    ],
    "trust": 2.34
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-40478",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-40478"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2009-3032",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "38468",
        "trust": 2.8
      },
      {
        "db": "SECUNIA",
        "id": "38823",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "38797",
        "trust": 0.9
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-0533",
        "trust": 0.8
      },
      {
        "db": "VUPEN",
        "id": "ADV-2010-0534",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001844",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201003-053",
        "trust": 0.7
      },
      {
        "db": "NSFOCUS",
        "id": "14591",
        "trust": 0.6
      },
      {
        "db": "IDEFENSE",
        "id": "20100304 AUTONOMY KEYVIEW OLE DOCUMENT INTEGER OVERFLOW VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "86946",
        "trust": 0.2
      },
      {
        "db": "VULHUB",
        "id": "VHN-40478",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "86952",
        "trust": 0.1
      },
      {
        "db": "SECUNIA",
        "id": "38809",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "86956",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "86954",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-40478"
      },
      {
        "db": "BID",
        "id": "38468"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      },
      {
        "db": "PACKETSTORM",
        "id": "86952"
      },
      {
        "db": "PACKETSTORM",
        "id": "86956"
      },
      {
        "db": "PACKETSTORM",
        "id": "86946"
      },
      {
        "db": "PACKETSTORM",
        "id": "86954"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201003-053"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3032"
      }
    ]
  },
  "id": "VAR-201003-0114",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-40478"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T23:10:11.585000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Lotus Notes/Domino 8.5.1",
        "trust": 0.8,
        "url": "http://www-10.lotus.com/ldd%5CR5FixList.nsf/WhatsNew/61f6dc55689d10b18525774d0055319a?OpenDocument"
      },
      {
        "title": "734173",
        "trust": 0.8,
        "url": "http://www-06.ibm.com/jp/domino04/lotus/support/faqs/faqs.nsf/all/734173"
      },
      {
        "title": "1440812",
        "trust": 0.8,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812"
      },
      {
        "title": "SYM10-006",
        "trust": 0.8,
        "url": "http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100304_00"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-189",
        "trust": 1.9
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-40478"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3032"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/38468"
      },
      {
        "trust": 2.3,
        "url": "http://labs.idefense.com/intelligence/vulnerabilities/display.php?id=858"
      },
      {
        "trust": 1.1,
        "url": "http://www-01.ibm.com/support/docview.wss?uid=swg21440812"
      },
      {
        "trust": 1.0,
        "url": "http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100304_00"
      },
      {
        "trust": 1.0,
        "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026year=2010\u0026suid=20100304_00"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2009-3032"
      },
      {
        "trust": 0.8,
        "url": "http://web.nvd.nist.gov/view/vuln/detail?vulnid=cve-2009-3032"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/38823"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/38797"
      },
      {
        "trust": 0.8,
        "url": "http://www.vupen.com/english/advisories/2010/0533"
      },
      {
        "trust": 0.8,
        "url": "http://www.vupen.com/english/advisories/2010/0534"
      },
      {
        "trust": 0.6,
        "url": "http://www.nsfocus.net/vulndb/14591"
      },
      {
        "trust": 0.3,
        "url": "http://www.autonomy.com/content/products/keyview/index.en.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.symantec.com"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/advisories/38797/"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/vulnerability_scanning/corporate/wsus_3rd_third_party_patching/"
      },
      {
        "trust": 0.3,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026amp;pvid=security_advisory\u0026amp;year=2010\u0026amp;suid=20100304_00"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/38823/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/38809/"
      },
      {
        "trust": 0.1,
        "url": "http://www.symantec.com/business/security_response/securityupdates/detail.jsp?fid=security_advisory\u0026pvid=security_advisory\u0026suid=20100304_00"
      },
      {
        "trust": 0.1,
        "url": "http://www.autonomy.com/"
      },
      {
        "trust": 0.1,
        "url": "http://cve.mitre.org/),"
      },
      {
        "trust": 0.1,
        "url": "http://labs.idefense.com/intelligence/vulnerabilities/"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2009-3032"
      },
      {
        "trust": 0.1,
        "url": "http://labs.idefense.com/methodology/vulnerability/vcp.php"
      },
      {
        "trust": 0.1,
        "url": "http://labs.idefense.com/"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-40478"
      },
      {
        "db": "BID",
        "id": "38468"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      },
      {
        "db": "PACKETSTORM",
        "id": "86952"
      },
      {
        "db": "PACKETSTORM",
        "id": "86956"
      },
      {
        "db": "PACKETSTORM",
        "id": "86946"
      },
      {
        "db": "PACKETSTORM",
        "id": "86954"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201003-053"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3032"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-40478"
      },
      {
        "db": "BID",
        "id": "38468"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      },
      {
        "db": "PACKETSTORM",
        "id": "86952"
      },
      {
        "db": "PACKETSTORM",
        "id": "86956"
      },
      {
        "db": "PACKETSTORM",
        "id": "86946"
      },
      {
        "db": "PACKETSTORM",
        "id": "86954"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201003-053"
      },
      {
        "db": "NVD",
        "id": "CVE-2009-3032"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2010-03-05T00:00:00",
        "db": "VULHUB",
        "id": "VHN-40478"
      },
      {
        "date": "2010-03-04T00:00:00",
        "db": "BID",
        "id": "38468"
      },
      {
        "date": "2010-08-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      },
      {
        "date": "2010-03-06T07:32:04",
        "db": "PACKETSTORM",
        "id": "86952"
      },
      {
        "date": "2010-03-06T07:32:15",
        "db": "PACKETSTORM",
        "id": "86956"
      },
      {
        "date": "2010-03-05T21:18:30",
        "db": "PACKETSTORM",
        "id": "86946"
      },
      {
        "date": "2010-03-06T07:32:09",
        "db": "PACKETSTORM",
        "id": "86954"
      },
      {
        "date": "2010-03-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201003-053"
      },
      {
        "date": "2010-03-05T19:30:00.313000",
        "db": "NVD",
        "id": "CVE-2009-3032"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2013-02-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-40478"
      },
      {
        "date": "2010-03-05T08:02:00",
        "db": "BID",
        "id": "38468"
      },
      {
        "date": "2010-08-19T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      },
      {
        "date": "2010-03-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-201003-053"
      },
      {
        "date": "2024-11-21T01:06:21.393000",
        "db": "NVD",
        "id": "CVE-2009-3032"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "86946"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-201003-053"
      }
    ],
    "trust": 0.7
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Autonomy KeyView Filter SDK of  kvolefio.dll Integer overflow vulnerability",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2010-001844"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "digital error",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-201003-053"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.