Multiple heap-based buffer overflows in emlsr.dll in the EML reader in Autonomy (formerly Verity) KeyView 10.3.0.0, as used by IBM Lotus Notes, allow remote attackers to execute arbitrary code via a long (1) To, (2) Cc, (3) Bcc, (4) From, (5) Date, (6) Subject, (7) Priority, (8) Importance, or (9) X-MSMail-Priority header; (10) a long string at the beginning of an RFC2047 encoded-word in a header; (11) a long text string in an RFC2047 encoded-word in a header; or (12) a long Subject header, related to creation of an associated filename.
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.
Link | Tags |
---|---|
http://secunia.com/advisories/28209 | third party advisory vendor advisory |
http://www.securityfocus.com/archive/1/490832/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2008/1156 | vdb entry |
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453 | |
http://www.securityfocus.com/bid/28454 | vdb entry |
http://secunia.com/advisories/28210 | third party advisory vendor advisory |
http://secunia.com/secunia_research/2007-91/advisory/ | vendor advisory |
http://www.securitytracker.com/id?1019842 | vdb entry |
http://www.securityfocus.com/archive/1/490833/100/0/threaded | mailing list |
http://www.vupen.com/english/advisories/2008/1153 | vdb entry |
http://secunia.com/secunia_research/2007-92/advisory/ | vendor advisory |
https://exchange.xforce.ibmcloud.com/vulnerabilities/41723 | vdb entry |