CVE-2005-2618

CVSS V2 High 9.3 CVSS V3 None
Description
Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allow remote attackers to execute arbitrary code via (1) a UUE file containing an encoded file with a long filename handled by uudrdr.dll, (2) a compressed ZIP file with a long filename handled by kvarcve.dll, (3) a TAR archive with a long filename that is extracted to a directory with a long path handled by the TAR reader (tarrdr.dll), (4) an email that contains a long HTTP, FTP, or // link handled by the HTML speed reader (htmsr.dll) or (5) an email containing a crafted long link handled by the HTML speed reader (htmsr.dll).
Overview
  • CVE ID
  • CVE-2005-2618
  • Assigner
  • cve@mitre.org
  • Vulnerability Status
  • Modified
  • Published Version
  • 2005-12-31T05:00:00
  • Last Modified Date
  • 2018-10-19T15:33:14
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:C/I:C/A:C
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • COMPLETE
  • Integrity Impact
  • COMPLETE
  • Availability Impact
  • COMPLETE
  • Base Score
  • 9.3
  • Severity
  • HIGH
  • Exploitability Score
  • 8.6
  • Impact Score
  • 10
References
History
Created Old Value New Value Data Type Notes
2022-05-10 18:05:15 Added to TrackCVE