CVE-2007-5399

N/A Unknown
Published: April 10, 2008 Modified: April 23, 2026
View on NVD

Description

Multiple heap-based buffer overflows in emlsr.dll in the EML reader in Autonomy (formerly Verity) KeyView 10.3.0.0, as used by IBM Lotus Notes, allow remote attackers to execute arbitrary code via a long (1) To, (2) Cc, (3) Bcc, (4) From, (5) Date, (6) Subject, (7) Priority, (8) Importance, or (9) X-MSMail-Priority header; (10) a long string at the beginning of an RFC2047 encoded-word in a header; (11) a long text string in an RFC2047 encoded-word in a header; or (12) a long Subject header, related to creation of an associated filename.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/28209
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/advisories/28210
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/secunia_research/2007-91/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/secunia_research/2007-92/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://www.securityfocus.com/bid/28454
Source: PSIRT-CNA@flexerasoftware.com
http://www.securitytracker.com/id?1019842
Source: PSIRT-CNA@flexerasoftware.com
http://www.vupen.com/english/advisories/2008/1153
Source: PSIRT-CNA@flexerasoftware.com
http://www.vupen.com/english/advisories/2008/1156
Source: PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/28209
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28210
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/secunia_research/2007-91/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/secunia_research/2007-92/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/490832/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/490833/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/28454
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1019842
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1153
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1156
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/41723
Source: af854a3a-2127-422b-91ae-364da2661108

24 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
27.5%
96th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

autonomy ibm