Vulnerability Details : CVE-2005-2618
Multiple stack-based buffer overflows in Autonomy (formerly Verity) KeyView SDK before 9.2.0, as used in Lotus Notes 6.5.4 and 7.0, allow remote attackers to execute arbitrary code via (1) a UUE file containing an encoded file with a long filename handled by uudrdr.dll, (2) a compressed ZIP file with a long filename handled by kvarcve.dll, (3) a TAR archive with a long filename that is extracted to a directory with a long path handled by the TAR reader (tarrdr.dll), (4) an email that contains a long HTTP, FTP, or // link handled by the HTML speed reader (htmsr.dll) or (5) an email containing a crafted long link handled by the HTML speed reader (htmsr.dll).
Vulnerability category: OverflowExecute code
Products affected by CVE-2005-2618
- cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*
- cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*
- cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*
- cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*
- cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2005-2618
94.99%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2005-2618
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
9.3
|
HIGH | AV:N/AC:M/Au:N/C:C/I:C/A:C |
8.6
|
10.0
|
NIST |
CWE ids for CVE-2005-2618
-
The product performs operations on a memory buffer, but it reads from or writes to a memory location outside the buffer's intended boundary. This may result in read or write operations on unexpected memory locations that could be linked to other variables, data structures, or internal program data.Assigned by: nvd@nist.gov (Primary)
References for CVE-2005-2618
-
http://securitytracker.com/id?1015657
Patch
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24638
-
http://www.kb.cert.org/vuls/id/884076
Third Party Advisory;US Government Resource
-
http://www.securityfocus.com/archive/1/424692/100/0/threaded
-
http://www.securityfocus.com/bid/16576
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24639
-
http://www.securityfocus.com/archive/1/424626/100/0/threaded
-
http://www.vupen.com/english/advisories/2006/0500
-
http://www.securityfocus.com/archive/1/424666/100/0/threaded
-
http://www-1.ibm.com/support/docview.wss?rs=475&uid=swg21229918
Patch
-
http://www.securityfocus.com/archive/1/424689/100/0/threaded
-
http://www.vupen.com/english/advisories/2006/0501
Vendor Advisory
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24635
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/24636
Jump to