---------------------------------------------------------------------- A new version (0.9.0.0 - Release Candidate 1) of the free Secunia PSI has been released. The new version includes many new and advanced features, which makes it even easier to stay patched. Download and test it today: https://psi.secunia.com/ Read more about this new version: https://psi.secunia.com/?page=changelog ---------------------------------------------------------------------- TITLE: Autonomy Keyview SDK Multiple Buffer Overflows SECUNIA ADVISORY ID: SA28209 VERIFY ADVISORY: http://secunia.com/advisories/28209/ CRITICAL: Highly critical IMPACT: System access WHERE: >From remote SOFTWARE: Verity KeyView Viewer SDK 7.x http://secunia.com/product/5570/ Verity KeyView Filter SDK 7.x http://secunia.com/product/7990/ Verity KeyView Export SDK 7.x http://secunia.com/product/7989/ Autonomy KeyView Export SDK 10.x http://secunia.com/product/16574/ Autonomy KeyView Filter SDK 10.x http://secunia.com/product/16576/ Autonomy KeyView Viewing SDK 10.x http://secunia.com/product/16575/ Verity KeyView Export SDK 8.x http://secunia.com/product/7997/ Verity KeyView Export SDK 9.x http://secunia.com/product/7998/ Verity KeyView Filter SDK 8.x http://secunia.com/product/7995/ Verity KeyView Filter SDK 9.x http://secunia.com/product/7996/ Verity KeyView Viewer SDK 8.x http://secunia.com/product/7992/ Verity KeyView Viewer SDK 9.x http://secunia.com/product/7994/ DESCRIPTION: Secunia Research has discovered multiple vulnerabilities in Autonomy Keyview, which can be exploited by malicious people to compromise a vulnerable system. 1) A boundary error within the HTML speed reader (htmsr.dll) when handling links in e.g. the "background" attribute of
tags can be exploited to cause a stack-based buffer overflow. 2) A boundary error within the HTML speed reader (htmsr.dll) when handling e.g. the "src" attribute of tags can be exploited to cause a stack-based buffer overflow. 3) A boundary error within the HTML speed reader (htmsr.dll) when handling large chunks of data inside an HTML document can be exploited to cause a heap-based buffer overflow. 4) A boundary error within kvdocve.dll when processing overly long paths can be exploited to cause a buffer overflow via e.g. an overly long link inside the "src" attribute of an tag within an HTML document. 5) 21 boundary errors within the "Folio Flat File" speed reader (foliosr.dll) when handling attribute values of a number of tags (eg. DI, FD, FT, JD, JL, LE, OB, OD, OL, PN, PS, PW, RD, QL, or TS) can be exploited to cause stack-based buffer overflows. 6) An unsafe call to "sscanf()" in the Applix Graphics reader (kpagrdr.dll) when parsing the "ENCODING" attribute of the "*BEGIN" tag can be exploited to cause a stack-based buffer overflow. 7) A boundary error in the Applix Graphics reader (kpagrdr.dll) when parsing overly long tokens from the input file can be exploited to cause a heap-based buffer overflow. 8) A boundary error in the Applix Graphics reader (kpagrdr.dll) when parsing the initial "*BEGIN" tag can be exploited to cause stack-based buffer overflow. 9) A logic error in the Applix Graphics reader (kpagrdr.dll) when parsing long tokens can result in an infinite loop. Exploitation will result in maximum CPU usage until an application-configured timeout expires. In some cases memory usage will increase until the OS terminates the process. 10) A boundary error in the EML reader (emlsr.dll) when parsing certain headers ("To:", "Cc:", "Bcc:", "From:", "Date:", "Subject:", "Priority:", "Importance:", and "X-MSMail-Priority:") in EML files can be exploited to cause a heap-based buffer overflow via an overly long string. 11) A boundary error in the EML reader (emlsr.dll) when encountering the beginning of RFC2047 encoded-words in headers can be exploited to cause a heap-based buffer overflow via an overly long string. 12) A boundary error in the EML reader (emlsr.dll) when parsing the text string in RFC2047 encoded-words in headers can be exploited to cause a heap-based buffer overflow via an overly long string. 13) A boundary error in the EML reader (emlsr.dll) when creating a filename based on the subject in an EML file can be exploited to cause a heap-based buffer overflow via an overly long string. SOLUTION: Update to version 10.4.0.0 or later. PROVIDED AND/OR DISCOVERED BY: 1-4) Secunia Research 5-9) Dyon Balding, Secunia Research. 10-13) Carsten Eiram, Secunia Research. ORIGINAL ADVISORY: Secunia Research: http://secunia.com/secunia_research/2007-91/ http://secunia.com/secunia_research/2007-95/ http://secunia.com/secunia_research/2007-104/ ---------------------------------------------------------------------- About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities. Subscribe: http://secunia.com/secunia_security_advisories/ Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/ Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor. ---------------------------------------------------------------------- Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org ----------------------------------------------------------------------