First published: Thu Apr 10 2008(Updated: )
Multiple heap-based buffer overflows in emlsr.dll in the EML reader in Autonomy (formerly Verity) KeyView 10.3.0.0, as used by IBM Lotus Notes, allow remote attackers to execute arbitrary code via a long (1) To, (2) Cc, (3) Bcc, (4) From, (5) Date, (6) Subject, (7) Priority, (8) Importance, or (9) X-MSMail-Priority header; (10) a long string at the beginning of an RFC2047 encoded-word in a header; (11) a long text string in an RFC2047 encoded-word in a header; or (12) a long Subject header, related to creation of an associated filename.
Credit: PSIRT-CNA@flexerasoftware.com
Affected Software | Affected Version | How to fix |
---|---|---|
Verity KeyView Viewing SDK | =10.3.0.0 | |
IBM Lotus Notes | =6.0 | |
IBM Lotus Notes | =6.5 | |
IBM Lotus Notes | =7.0 | |
IBM Lotus Notes | =7.0.2 | |
IBM Lotus Notes | =7.0.3 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5399 is classified as a critical vulnerability due to its potential for remote code execution.
To fix CVE-2007-5399, you should update to the latest version of affected software that addresses this vulnerability.
CVE-2007-5399 affects multiple versions of IBM Lotus Notes and Autonomy KeyView 10.3.0.0.
Yes, CVE-2007-5399 can be exploited remotely through carefully crafted email headers.
Exploiting CVE-2007-5399 could allow an attacker to execute arbitrary code on the affected system.