CVE-2007-6020

N/A Unknown
Published: April 10, 2008 Modified: April 23, 2026
View on NVD

Description

Multiple stack-based buffer overflows in foliosr.dll in the Folio Flat File speed reader in Autonomy (formerly Verity) KeyView 10.3.0.0, as used by IBM Lotus Notes, Symantec Mail Security, and activePDF DocConverter, allow remote attackers to execute arbitrary code via a long attribute value in a (1) DI, (2) FD, (3) FT, (4) JD, (5) JL, (6) LE, (7) OB, (8) OD, (9) OL, (10) PN, (11) PS, (12) PW, (13) RD, (14) QL, or (15) TS tag in a .fff file.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/27763
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/advisories/28140
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/advisories/28209
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/advisories/28210
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/advisories/29342
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/secunia_research/2007-104/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/secunia_research/2007-105/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/secunia_research/2007-106/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://secunia.com/secunia_research/2007-107/advisory/
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://securitytracker.com/id?1019805
Source: PSIRT-CNA@flexerasoftware.com
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453
Source: PSIRT-CNA@flexerasoftware.com
Vendor Advisory
http://www.securityfocus.com/bid/28454
Source: PSIRT-CNA@flexerasoftware.com
http://www.securitytracker.com/id?1019841
Source: PSIRT-CNA@flexerasoftware.com
http://www.vupen.com/english/advisories/2008/1153
Source: PSIRT-CNA@flexerasoftware.com
http://www.vupen.com/english/advisories/2008/1154
Source: PSIRT-CNA@flexerasoftware.com
http://www.vupen.com/english/advisories/2008/1156
Source: PSIRT-CNA@flexerasoftware.com
http://secunia.com/advisories/27763
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28140
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28209
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/28210
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/29342
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/secunia_research/2007-104/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/secunia_research/2007-105/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/secunia_research/2007-106/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/secunia_research/2007-107/advisory/
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1019805
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/docview.wss?rs=463&uid=swg21298453
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.securityfocus.com/archive/1/490827/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/490829/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/490830/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/490831/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/28454
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id?1019841
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1153
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1154
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1156
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/41716
Source: af854a3a-2127-422b-91ae-364da2661108

44 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
34.7%
97th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

symantec autonomy activepdf ibm