CVE-2007-5406

N/A Unknown
Published: April 10, 2008 Modified: April 23, 2026
View on NVD

Description

kpagrdr.dll 2.0.0.2 and 10.3.0.0 in the Applix Presents reader in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, does not properly parse long tokens, which allows remote attackers to cause a denial of service (CPU and memory consumption) via a crafted .ag file.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/27763
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/advisories/28140
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/advisories/28209
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/advisories/28210
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/advisories/29342
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/secunia_research/2007-95/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/secunia_research/2007-96/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/secunia_research/2007-97/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/secunia_research/2007-98/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://securitytracker.com/id?1019805
Source: PSIRT-CNA@flexerasoftware.com
http://www.securityfocus.com/bid/28454
Source: PSIRT-CNA@flexerasoftware.com
http://www.securitytracker.com/id?1019844
Source: PSIRT-CNA@flexerasoftware.com
http://www.vupen.com/english/advisories/2008/1153
Source: PSIRT-CNA@flexerasoftware.com
http://www.vupen.com/english/advisories/2008/1154
Source: PSIRT-CNA@flexerasoftware.com
http://www.vupen.com/english/advisories/2008/1156
Source: PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/27763
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28140
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28209
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28210
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29342
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/secunia_research/2007-95/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/secunia_research/2007-96/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/secunia_research/2007-97/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/secunia_research/2007-98/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1019805
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/490825/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/490837/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/490838/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/490839/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/28454
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1019844
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1153
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1154
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1156
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/41722
Source: af854a3a-2127-422b-91ae-364da2661108

40 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
25.8%
96th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

symantec autonomy ibm