ID

VAR-202002-0036


CVE

CVE-2012-6277


TITLE

Autonomy Keyview IDOL contains multiple vulnerabilities in file parsers

Trust: 0.8

sources: CERT/CC: VU#849841

DESCRIPTION

Multiple unspecified vulnerabilities in Autonomy KeyView IDOL before 10.16, as used in Symantec Mail Security for Microsoft Exchange before 6.5.8, Symantec Mail Security for Domino before 8.1.1, Symantec Messaging Gateway before 10.0.1, Symantec Data Loss Prevention (DLP) before 11.6.1, IBM Notes 8.5.x, IBM Lotus Domino 8.5.x before 8.5.3 FP4, and other products, allow remote attackers to execute arbitrary code or cause a denial of service (memory corruption) via a crafted file, related to "a number of underlying issues" in which "some of these cases demonstrated memory corruption with attacker-controlled input and could be exploited to run arbitrary code.". Autonomy KeyView IDOL The library contains multiple vulnerabilities in the file parsing process. Autonomy KeyView IDOL Is 1000 A library that decodes these file formats and is used in many applications. Autonomy KeyView IDOL The library contains multiple vulnerabilities such as memory corruption and arbitrary code execution.Although the impact will vary depending on the application, service operation may be interrupted by opening a specially crafted file. ( DoS ) An attacker could be attacked or execute arbitrary code with application privileges. Failed attempts may result in a denial-of-service condition. A security vulnerability exists in Micro Focus Autonomy KeyView IDOL versions prior to 10.16. ---------------------------------------------------------------------- The final version of the CSI 6.0 has been released. Find out why this is not just another Patch Management solution: http://secunia.com/blog/325/ ---------------------------------------------------------------------- TITLE: Autonomy KeyView File Processing Vulnerabilities SECUNIA ADVISORY ID: SA51362 VERIFY ADVISORY: Secunia.com http://secunia.com/advisories/51362/ Customer Area (Credentials Required) https://ca.secunia.com/?page=viewadvisory&vuln_id=51362 RELEASE DATE: 2012-11-21 DISCUSS ADVISORY: http://secunia.com/advisories/51362/#comments AVAILABLE ON SITE AND IN CUSTOMER AREA: * Last Update * Popularity * Comments * Criticality Level * Impact * Where * Solution Status * Operating System / Software * CVE Reference(s) http://secunia.com/advisories/51362/ ONLY AVAILABLE IN CUSTOMER AREA: * Authentication Level * Report Reliability * Secunia PoC * Secunia Analysis * Systems Affected * Approve Distribution * Remediation Status * Secunia CVSS Score * CVSS https://ca.secunia.com/?page=viewadvisory&vuln_id=51362 ONLY AVAILABLE WITH SECUNIA CSI AND SECUNIA PSI: * AUTOMATED SCANNING http://secunia.com/vulnerability_scanning/personal/ http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/ DESCRIPTION: Multiple vulnerabilities have been reported in Autonomy KeyView, which can be exploited by malicious people to compromise a vulnerable system. The vulnerabilities are caused due to errors when processing unspecified file formats and can be exploited to corrupt memory. No further information is currently available. The vulnerabilities are reported in versions prior to 10.16. SOLUTION: Update to version 10.16. PROVIDED AND/OR DISCOVERED BY: Will Dormann, CERT/CC ORIGINAL ADVISORY: US-CERT VU#849841: http://www.kb.cert.org/vuls/id/849841 OTHER REFERENCES: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ DEEP LINKS: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED DESCRIPTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXTENDED SOLUTION: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ EXPLOIT: Further details available in Customer Area: http://secunia.com/vulnerability_intelligence/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help private users keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/advisories/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------

Trust: 2.88

sources: NVD: CVE-2012-6277 // CERT/CC: VU#849841 // JVNDB: JVNDB-2012-005584 // BID: 56610 // VULHUB: VHN-59558 // PACKETSTORM: 118283 // PACKETSTORM: 118291

AFFECTED PRODUCTS

vendor:ibmmodel:dominoscope:gteversion:8.5.0

Trust: 1.0

vendor:symantecmodel:messaging gatewayscope:ltversion:10.0.1

Trust: 1.0

vendor:ibmmodel:notesscope:gteversion:8.5

Trust: 1.0

vendor:symantecmodel:data loss prevention endpointscope:ltversion:11.6.1

Trust: 1.0

vendor:symantecmodel:mail securityscope:lteversion:6.5.7

Trust: 1.0

vendor:symantecmodel:data loss prevention endpointscope:gteversion:11.0

Trust: 1.0

vendor:symantecmodel:mail securityscope:eqversion:6.5.7

Trust: 1.0

vendor:ibmmodel:notesscope:lteversion:8.5.3

Trust: 1.0

vendor:symantecmodel:data loss prevention enforce\/detection serversscope:ltversion:11.6.1

Trust: 1.0

vendor:symantecmodel:messaging gatewayscope:gteversion:9.5

Trust: 1.0

vendor:hpmodel:autonomy keyview idolscope:ltversion:10.16

Trust: 1.0

vendor:ibmmodel:dominoscope:lteversion:8.5.3.6

Trust: 1.0

vendor:symantecmodel:data loss prevention enforce\/detection serversscope:gteversion:11.0

Trust: 1.0

vendor:symantecmodel:mail securityscope:lteversion:8.1.0

Trust: 1.0

vendor:autonomymodel: - scope: - version: -

Trust: 0.8

vendor:camodel: - scope: - version: -

Trust: 0.8

vendor:ciscomodel: - scope: - version: -

Trust: 0.8

vendor:emcmodel: - scope: - version: -

Trust: 0.8

vendor:hewlett packardmodel: - scope: - version: -

Trust: 0.8

vendor:hylandmodel: - scope: - version: -

Trust: 0.8

vendor:ibmmodel: - scope: - version: -

Trust: 0.8

vendor:lotusmodel: - scope: - version: -

Trust: 0.8

vendor:mcafeemodel: - scope: - version: -

Trust: 0.8

vendor:nuancemodel: - scope: - version: -

Trust: 0.8

vendor:oraclemodel: - scope: - version: -

Trust: 0.8

vendor:palisademodel: - scope: - version: -

Trust: 0.8

vendor:proofpointmodel: - scope: - version: -

Trust: 0.8

vendor:symantecmodel: - scope: - version: -

Trust: 0.8

vendor:trend micromodel: - scope: - version: -

Trust: 0.8

vendor:trustwavemodel: - scope: - version: -

Trust: 0.8

vendor:vmwaremodel: - scope: - version: -

Trust: 0.8

vendor:verdasysmodel: - scope: - version: -

Trust: 0.8

vendor:websensemodel: - scope: - version: -

Trust: 0.8

vendor:autonomymodel:keyview idolscope:ltversion:library 10.16 earlier

Trust: 0.8

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:6.5.1

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.0.2

Trust: 0.3

vendor:ibmmodel:lotus notes fp6scope:eqversion:8.0.2

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.3

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.0.0

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:6.5

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.1.0

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.0.2.1

Trust: 0.3

vendor:ibmmodel:lotus domino 8.5.3fp1scope: - version: -

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5.2

Trust: 0.3

vendor:symantecmodel:messaging gatewayscope:eqversion:9.5.1

Trust: 0.3

vendor:ibmmodel:lotus domino fix packscope:eqversion:8.5.12

Trust: 0.3

vendor:autonomymodel:keyview idolscope:eqversion:10

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5.1

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for linuxscope:eqversion:11.1

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.0.2.0

Trust: 0.3

vendor:ibmmodel:lotus notes fp2scope:eqversion:8.5.2

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.1.2

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5

Trust: 0.3

vendor:vmwaremodel:zimbrascope:eqversion:0

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:6.5.5

Trust: 0.3

vendor:ibmmodel:lotus dominoscope:eqversion:8.5.3

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.1.3

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for windowsscope:eqversion:11.1

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for linuxscope:eqversion:11.0

Trust: 0.3

vendor:autonomymodel:keyview idolscope:eqversion:10.13.1

Trust: 0.3

vendor:symantecmodel:data loss prevention endpoint agentsscope:eqversion:11.1.1

Trust: 0.3

vendor:symantecmodel:data loss prevention endpoint agentsscope:eqversion:11.1

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.2

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.1.1

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.0.1

Trust: 0.3

vendor:ibmmodel:lotus domino 8.5fp1scope: - version: -

Trust: 0.3

vendor:ibmmodel:lotus domino fp4scope:eqversion:8.5.2

Trust: 0.3

vendor:ibmmodel:lotus domino 8.5.1fp5scope: - version: -

Trust: 0.3

vendor:ibmmodel:lotus domino fp3scope:eqversion:8.5.2

Trust: 0.3

vendor:symantecmodel:data loss prevention detection servers for windowsscope:eqversion:11.0

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5.1

Trust: 0.3

vendor:ibmmodel:lotus domino fp2scope:eqversion:8.5.2

Trust: 0.3

vendor:symantecmodel:mail security for microsoft exchangescope:eqversion:6.5.6

Trust: 0.3

vendor:ibmmodel:lotus notes fp5scope:eqversion:8.5.1

Trust: 0.3

vendor:ibmmodel:lotus notesscope:eqversion:8.5

Trust: 0.3

sources: CERT/CC: VU#849841 // BID: 56610 // JVNDB: JVNDB-2012-005584 // NVD: CVE-2012-6277

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2012-6277
value: HIGH

Trust: 1.0

NVD: CVE-2012-6277
value: HIGH

Trust: 0.8

IPA: JVNDB-2012-005584
value: HIGH

Trust: 0.8

CNNVD: CNNVD-201211-461
value: HIGH

Trust: 0.6

VULHUB: VHN-59558
value: HIGH

Trust: 0.1

nvd@nist.gov: CVE-2012-6277
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.0

NVD: CVE-2012-6277
severity: HIGH
baseScore: 10.0
vectorString: NONE
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 10.0
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

IPA: JVNDB-2012-005584
severity: HIGH
baseScore: 10.0
vectorString: AV:N/AC:L/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: LOW
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: NONE
impactScore: NONE
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.8

VULHUB: VHN-59558
severity: HIGH
baseScore: 9.3
vectorString: AV:N/AC:M/AU:N/C:C/I:C/A:C
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: COMPLETE
integrityImpact: COMPLETE
availabilityImpact: COMPLETE
exploitabilityScore: 8.6
impactScore: 10.0
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2012-6277
baseSeverity: HIGH
baseScore: 7.8
vectorString: CVSS:3.1/AV:L/AC:L/PR:N/UI:R/S:U/C:H/I:H/A:H
attackVector: LOCAL
attackComplexity: LOW
privilegesRequired: NONE
userInteraction: REQUIRED
scope: UNCHANGED
confidentialityImpact: HIGH
integrityImpact: HIGH
availabilityImpact: HIGH
exploitabilityScore: 1.8
impactScore: 5.9
version: 3.1

Trust: 1.0

sources: CERT/CC: VU#849841 // VULHUB: VHN-59558 // JVNDB: JVNDB-2012-005584 // CNNVD: CNNVD-201211-461 // NVD: CVE-2012-6277

PROBLEMTYPE DATA

problemtype:NVD-CWE-noinfo

Trust: 1.0

sources: NVD: CVE-2012-6277

THREAT TYPE

local

Trust: 0.6

sources: CNNVD: CNNVD-201211-461

TYPE

other

Trust: 0.6

sources: CNNVD: CNNVD-201211-461

CONFIGURATIONS

sources: JVNDB: JVNDB-2012-005584

PATCH

title:Autonomy Global Officesurl:http://www.autonomy.com/content/Autonomy/Offices/index.en.html

Trust: 0.8

title:IDOLコネクタurl:http://www.autonomy.co.jp/content/Technology/idol-functionality-information-connectivity/index.ja.html

Trust: 0.8

title:KeyView IDOL & Connectorsurl:http://www.autonomy.com/content/Products/idol-modules-connectors/index.en.html

Trust: 0.8

title:Security Advisories Relating to Symantec Products - Symantec Updates HP Autonomy Keyview Filter Issues Affecting Multiple Vendorsurl:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&suid=20121120_00

Trust: 0.8

title:セキュリティ アドバイザリー - 複数のベンダーが影響を受ける HP Autonomy KeyView Filter の問題に関する更新 (SYM12-018)url:https://www.symantec.com/ja/jp/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20121120_00

Trust: 0.8

title:Micro Focus Autonomy KeyView IDOL Security vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=110271

Trust: 0.6

sources: JVNDB: JVNDB-2012-005584 // CNNVD: CNNVD-201211-461

EXTERNAL IDS

db:CERT/CCid:VU#849841

Trust: 3.8

db:BIDid:56610

Trust: 2.8

db:NVDid:CVE-2012-6277

Trust: 2.0

db:SECUNIAid:51362

Trust: 1.0

db:SECTRACKid:1027799

Trust: 0.8

db:OSVDBid:87619

Trust: 0.8

db:JVNDBid:JVNDB-2012-005584

Trust: 0.8

db:CNNVDid:CNNVD-201211-461

Trust: 0.7

db:SECUNIAid:51365

Trust: 0.2

db:VULHUBid:VHN-59558

Trust: 0.1

db:PACKETSTORMid:118283

Trust: 0.1

db:PACKETSTORMid:118291

Trust: 0.1

sources: CERT/CC: VU#849841 // VULHUB: VHN-59558 // BID: 56610 // JVNDB: JVNDB-2012-005584 // PACKETSTORM: 118283 // PACKETSTORM: 118291 // CNNVD: CNNVD-201211-461 // NVD: CVE-2012-6277

REFERENCES

url:https://www.securityfocus.com/bid/56610

Trust: 2.5

url:https://support.symantec.com/us/en/article.symsa1262.html

Trust: 1.7

url:https://tools.cisco.com/security/center/viewalert.x?alertid=27482

Trust: 1.7

url:https://vulmon.com/vulnerabilitydetails?qid=cve-2012-6277

Trust: 1.7

url:https://www.energy.gov/cio/articles/v-118-ibm-lotus-domino-multiple-vulnerabilities

Trust: 1.7

url:https://www.ibm.com/blogs/psirt/security-bulletin-security-vulnerabilities-addressed-in-ibm-notes-9-0-cve-2011-3026-cve-2012-6349-cve-2012-6277/

Trust: 1.7

url:https://www.kb.cert.org/vuls/id/849841/

Trust: 1.7

url:https://www.tenable.com/plugins/nessus/67192

Trust: 1.7

url:https://www.kb.cert.org/vuls/id/849841

Trust: 1.3

url:http://www.symantec.com/security_response/securityupdates/detail.jsp?fid=security_advisory&pvid=security_advisory&year=&suid=20121120_00

Trust: 1.2

url:http://www.autonomy.com/content/products/idol-modules-connectors/index.en.html

Trust: 1.1

url:http://www.autonomy.com/content/technology/idol-functionality-information-connectivity/index.en.html

Trust: 0.8

url:https://customers.autonomy.com

Trust: 0.8

url:http://support.microsoft.com/kb/2458544

Trust: 0.8

url:http://www.youtube.com/watch?v=28_lus_g0u4

Trust: 0.8

url:http://blogs.technet.com/srd/archive/2009/06/05/understanding-dep-as-a-mitigation-technology-part-1.aspx

Trust: 0.8

url:http://blogs.technet.com/srd/archive/2009/06/12/understanding-dep-as-a-mitigation-technology-part-2.aspx

Trust: 0.8

url:http://blogs.technet.com/b/srd/archive/2010/12/08/on-the-effectiveness-of-dep-and-aslr.aspx

Trust: 0.8

url:http://securitytracker.com/id/1027799

Trust: 0.8

url:http://www.osvdb.org/show/osvdb/87619

Trust: 0.8

url:http://secunia.com/advisories/51362

Trust: 0.8

url:http://www.autonomy.com/content/news/releases/2004/0803a.en.html

Trust: 0.8

url:http://www.autonomy.com/content/news/releases/2008/0701.en.html

Trust: 0.8

url:http://jvn.jp/cert/jvnvu849841

Trust: 0.8

url:https://nvd.nist.gov/vuln/detail/cve-2012-6277

Trust: 0.6

url:http://www-01.ibm.com/support/docview.wss?uid=swg21627992

Trust: 0.3

url:http://secunia.com/vulnerability_intelligence/

Trust: 0.2

url:http://secunia.com/advisories/secunia_security_advisories/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/corporate/wsus_sccm_3rd_third_party_patching/

Trust: 0.2

url:http://secunia.com/vulnerability_scanning/personal/

Trust: 0.2

url:http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Trust: 0.2

url:http://secunia.com/blog/325/

Trust: 0.2

url:http://secunia.com/advisories/about_secunia_advisories/

Trust: 0.2

url:http://secunia.com/advisories/51362/

Trust: 0.1

url:http://secunia.com/advisories/51362/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51362

Trust: 0.1

url:http://secunia.com/advisories/51365/#comments

Trust: 0.1

url:https://ca.secunia.com/?page=viewadvisory&vuln_id=51365

Trust: 0.1

url:http://secunia.com/advisories/51365/

Trust: 0.1

sources: CERT/CC: VU#849841 // VULHUB: VHN-59558 // BID: 56610 // JVNDB: JVNDB-2012-005584 // PACKETSTORM: 118283 // PACKETSTORM: 118291 // CNNVD: CNNVD-201211-461 // NVD: CVE-2012-6277

CREDITS

Will Dormann

Trust: 0.6

sources: CNNVD: CNNVD-201211-461

SOURCES

db:CERT/CCid:VU#849841
db:VULHUBid:VHN-59558
db:BIDid:56610
db:JVNDBid:JVNDB-2012-005584
db:PACKETSTORMid:118283
db:PACKETSTORMid:118291
db:CNNVDid:CNNVD-201211-461
db:NVDid:CVE-2012-6277

LAST UPDATE DATE

2024-09-10T21:21:49.335000+00:00


SOURCES UPDATE DATE

db:CERT/CCid:VU#849841date:2014-01-28T00:00:00
db:VULHUBid:VHN-59558date:2020-03-04T00:00:00
db:BIDid:56610date:2013-03-22T18:56:00
db:JVNDBid:JVNDB-2012-005584date:2012-11-30T00:00:00
db:CNNVDid:CNNVD-201211-461date:2020-03-13T00:00:00
db:NVDid:CVE-2012-6277date:2020-03-04T20:18:25.227

SOURCES RELEASE DATE

db:CERT/CCid:VU#849841date:2012-11-20T00:00:00
db:VULHUBid:VHN-59558date:2020-02-21T00:00:00
db:BIDid:56610date:2012-11-20T00:00:00
db:JVNDBid:JVNDB-2012-005584date:2012-11-30T00:00:00
db:PACKETSTORMid:118283date:2012-11-23T08:19:25
db:PACKETSTORMid:118291date:2012-11-23T08:19:51
db:CNNVDid:CNNVD-201211-461date:2012-11-27T00:00:00
db:NVDid:CVE-2012-6277date:2020-02-21T17:15:10.883