CVE-2007-5909 (CNNVD-200711-129)
中文标题:
Lotus Notes 多个第三方文件查看器栈缓冲区溢出漏洞
英文标题:
Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Expo...
漏洞描述
中文描述:
Lotus Domino/Notes服务器是一款基于WEB合作的应用程序架构,运行在Linux/Unix和Microsoft Windows操作系统平台下。 Lotus Notes中所捆绑的第三方文件查看器(wp6sr.dll)中存在多个缓冲区溢出漏洞,远程攻击者可能利用此漏洞通过诱使用户受骗使用该查看器查看了恶意的AG、EXE、RTF、DLL、DOC、SAM、WPD或MIF等格式的文件附件的话,就可以触发这些溢出,导致执行任意指令。
英文描述:
Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView Viewer, Filter, and Export SDK before 9.2.0.12, as used by ActivePDF DocConverter, IBM Lotus Notes before 7.0.3, Symantec Mail Security, and other products, allow remote attackers to execute arbitrary code via a crafted (1) AG file to kpagrdr.dll, (2) AW file to awsr.dll, (3) DLL or (4) EXE file to exesr.dll, (5) DOC file to mwsr.dll, (6) MIF file to mifsr.dll, (7) SAM file to lasr.dll, or (8) RTF file to rtfsr.dll. NOTE: the WPD (wp6sr.dll) vector is covered by CVE-2007-5910.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| activepdf | docconverter | 3.8.2_.5 | - | - |
cpe:2.3:a:activepdf:docconverter:3.8.2_.5:*:*:*:*:*:*:*
|
| autonomy | keyview_export_sdk | * | - | - |
cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*
|
| autonomy | keyview_filter_sdk | * | - | - |
cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*
|
| autonomy | keyview_viewer_sdk | * | - | - |
cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*
|
| ibm | lotus_notes | * | - | - |
cpe:2.3:a:ibm:lotus_notes:*:*:*:*:*:*:*:*
|
| symantec | mail_security | 5.0 | - | - |
cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*
|
| symantec | mail_security | 5.0.0 | - | - |
cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*
|
| symantec | mail_security | 5.0.0.24 | - | - |
cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*
|
| symantec | mail_security | 5.0.1 | - | - |
cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*
|
| symantec | mail_security | 7.5 | - | - |
cpe:2.3:a:symantec:mail_security:7.5:*:domino:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
AV:N/AC:M/Au:N/C:C/I:C/A:C
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2007-5909 |
2025-11-11 15:17:56 | 2025-11-11 07:32:48 |
| NVD | nvd_CVE-2007-5909 |
2025-11-11 14:52:13 | 2025-11-11 07:41:34 |
| CNNVD | cnnvd_CNNVD-200711-129 |
2025-11-11 15:08:59 | 2025-11-11 07:49:22 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 授权问题
- cnnvd_id: 未提取 -> CNNVD-200711-129
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
- cvss_score: 未提取 -> 9.3
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:M/Au:N/C:C/I:C/A:C
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 10
- data_sources: ['cve'] -> ['cve', 'nvd']