| CVSS Meta Temp Score | Current Exploit Price (≈) | CTI Interest Score |
|---|---|---|
| 9.0 | $0-$5k | 0.00 |
Summary
A vulnerability, which was classified as critical, was found in IBM Lotus Notes 7.0.3. Impacted is an unknown function in the library kvdocve.dll. The manipulation results in memory corruption. This vulnerability is cataloged as CVE-2008-1101. There is no exploit available. Applying a patch is advised to resolve this issue.
Details
A vulnerability classified as critical has been found in IBM Lotus Notes 7.0.3 (Groupware Software). Affected is some unknown functionality in the library kvdocve.dll. The manipulation with an unknown input leads to a memory corruption vulnerability. CWE is classifying the issue as CWE-119. The product performs operations on a memory buffer, but it can read from or write to a memory location that is outside of the intended boundary of the buffer. This is going to have an impact on confidentiality, integrity, and availability. CVE summarizes:
Buffer overflow in kvdocve.dll in the KeyView document viewing engine in Autonomy (formerly Verity) KeyView, as used by IBM Lotus Notes 7.0.2 and 7.0.3, allows remote attackers to execute arbitrary code via a long pathname, as demonstrated by a long SRC attribute of an IMG element in an HTML document.
The bug was discovered 04/08/2008. The weakness was shared 04/10/2008 by Carsten Eiram with Secunia Research (Website). The advisory is shared for download at xforce.iss.net. This vulnerability is traded as CVE-2008-1101 since 02/29/2008. It is possible to launch the attack remotely. The exploitation doesn't require any form of authentication. There are known technical details, but no exploit is available.
It is declared as proof-of-concept. The vulnerability scanner Nessus provides a plugin with the ID 68936 (Symantec Mail Security for SMTP Autonomy KeyView Module Multiple Buffer Overflows), which helps to determine the existence of the flaw in a target environment. It is assigned to the family Windows and running in the context l. The commercial vulnerability scanner Qualys is able to test this issue with plugin 115778 (IBM Lotus Notes Multiple KeyView Parsing Vulnerabilities).
Applying a patch is able to eliminate this problem. A possible mitigation has been published before and not just after the disclosure of the vulnerability. Furthermore it is possible to detect and prevent this kind of attack with TippingPoint and the filter 8800.
The vulnerability is also documented in the databases at X-Force (41725), Tenable (68936), SecurityFocus (BID 28454†), OSVDB (44192†) and Secunia (SA28140†). The entries VDB-41905, VDB-41903, VDB-41902 and VDB-41901 are related to this item. VulDB is the best source for vulnerability data and more expert information about this specific topic.
Product
Type
Vendor
Name
Version
License
Website
- Vendor: https://www.ibm.com/
CPE 2.3
CPE 2.2
CVSSv4
VulDB Vector: 🔍VulDB Reliability: 🔍
CVSSv3
VulDB Meta Base Score: 10.0VulDB Meta Temp Score: 9.0
VulDB Base Score: 10.0
VulDB Temp Score: 9.0
VulDB Vector: 🔍
VulDB Reliability: 🔍
CVSSv2
| AV | AC | Au | C | I | A |
|---|---|---|---|---|---|
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| 💳 | 💳 | 💳 | 💳 | 💳 | 💳 |
| Vector | Complexity | Authentication | Confidentiality | Integrity | Availability |
|---|---|---|---|---|---|
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
| Unlock | Unlock | Unlock | Unlock | Unlock | Unlock |
VulDB Base Score: 🔍
VulDB Temp Score: 🔍
VulDB Reliability: 🔍
NVD Base Score: 🔍
Exploiting
Class: Memory corruptionCWE: CWE-119
CAPEC: 🔍
ATT&CK: 🔍
Physical: No
Local: No
Remote: Yes
Availability: 🔍
Status: Proof-of-Concept
EPSS Score: 🔍
EPSS Percentile: 🔍
Price Prediction: 🔍
Current Price Estimation: 🔍
| 0-Day | Unlock | Unlock | Unlock | Unlock |
|---|---|---|---|---|
| Today | Unlock | Unlock | Unlock | Unlock |
Nessus ID: 68936
Nessus Name: Symantec Mail Security for SMTP Autonomy KeyView Module Multiple Buffer Overflows
Nessus File: 🔍
Nessus Risk: 🔍
Nessus Family: 🔍
Nessus Context: 🔍
Qualys ID: 🔍
Qualys Name: 🔍
Threat Intelligence
Interest: 🔍Active Actors: 🔍
Active APT Groups: 🔍
Countermeasures
Recommended: PatchStatus: 🔍
0-Day Time: 🔍
TippingPoint: 🔍
ISS Proventia IPS: 🔍
Timeline
02/29/2008 🔍04/08/2008 🔍
04/08/2008 🔍
04/08/2008 🔍
04/08/2008 🔍
04/10/2008 🔍
04/10/2008 🔍
04/21/2008 🔍
07/17/2013 🔍
03/16/2015 🔍
08/08/2019 🔍
Sources
Vendor: ibm.comAdvisory: xforce.iss.net
Researcher: Carsten Eiram
Organization: Secunia Research
Status: Not defined
Confirmation: 🔍
CVE: CVE-2008-1101 (🔍)
GCVE (CVE): GCVE-0-2008-1101
GCVE (VulDB): GCVE-100-41904
IAVM: 🔍
X-Force: 41725
SecurityFocus: 28454 - Autonomy KeyView Module Multiple Buffer Overflow Vulnerabilities
Secunia: 28140
OSVDB: 44192 - CVE-2008-1101 - IBM - Lotus Notes - Buffer Overflow Issue
Vulnerability Center: 18220 - Autonomy KeyView Buffer Overflow in kvdocve.dll, Medium
Vupen: ADV-2008-1153
See also: 🔍
Entry
Created: 03/16/2015 17:00Updated: 08/08/2019 17:23
Changes: 03/16/2015 17:00 (75), 08/08/2019 17:23 (9)
Complete: 🔍
Cache ID: 216:744:103
VulDB is the best source for vulnerability data and more expert information about this specific topic.
No comments yet. Languages: en.
Please log in to comment.