VYPR
Unrated severityNVD Advisory· Published Mar 18, 2009· Updated Apr 23, 2026

CVE-2008-4564

CVE-2008-4564

Description

Stack-based buffer overflow in wp6sr.dll in the Autonomy KeyView SDK 10.4 and earlier, as used in IBM Lotus Notes, Symantec Mail Security (SMS) products, Symantec BrightMail Appliance products, and Symantec Data Loss Prevention (DLP) products, allows remote attackers to execute arbitrary code via a crafted Word Perfect Document (WPD) file.

Affected products

67
  • cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:a:autonomy:keyview_export_sdk:*:*:*:*:*:*:*:*range: <=10.4
    • cpe:2.3:a:autonomy:keyview_export_sdk:10:*:*:*:*:*:*:*
    • cpe:2.3:a:autonomy:keyview_export_sdk:10.3:*:*:*:*:*:*:*
    • cpe:2.3:a:autonomy:keyview_export_sdk:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:autonomy:keyview_export_sdk:9.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:a:autonomy:keyview_filter_sdk:*:*:*:*:*:*:*:*range: <=10.4
    • cpe:2.3:a:autonomy:keyview_filter_sdk:10:*:*:*:*:*:*:*
    • cpe:2.3:a:autonomy:keyview_filter_sdk:10.3:*:*:*:*:*:*:*
    • cpe:2.3:a:autonomy:keyview_filter_sdk:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:autonomy:keyview_filter_sdk:9.2.0:*:*:*:*:*:*:*
  • cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*+ 4 more
    • cpe:2.3:a:autonomy:keyview_viewer_sdk:*:*:*:*:*:*:*:*range: <=10.4
    • cpe:2.3:a:autonomy:keyview_viewer_sdk:10:*:*:*:*:*:*:*
    • cpe:2.3:a:autonomy:keyview_viewer_sdk:10.3:*:*:*:*:*:*:*
    • cpe:2.3:a:autonomy:keyview_viewer_sdk:2.0:*:*:*:*:*:*:*
    • cpe:2.3:a:autonomy:keyview_viewer_sdk:9.2.0:*:*:*:*:*:*:*
  • IBM/Lotus Notes24 versions
    cpe:2.3:a:ibm:lotus_notes:5.0.12:*:*:*:*:*:*:*+ 23 more
    • cpe:2.3:a:ibm:lotus_notes:5.0.12:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:5.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.0:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.0.4:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.0.5:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.5:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.5.1:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.5.2:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.5.3:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.5.4:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.5.5:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.5.5:*:fp2:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.5.5:*:fp3:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.5.6:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:6.5.6:*:fp2:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:7.0.1:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:7.0.2:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:7.0.2:*:fp1:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:7.0.3:*:*:*:*:*:*:*
    • cpe:2.3:a:ibm:lotus_notes:8.0:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:altiris_deployment_solution:*:*:*:*:*:*:*:*
  • cpe:2.3:a:symantec:brightmail:5.0:*:appliance:*:*:*:*:*
  • cpe:2.3:a:symantec:data_loss_prevention_detection_servers:7.0:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:symantec:data_loss_prevention_detection_servers:7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:symantec:data_loss_prevention_detection_servers:8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:symantec:data_loss_prevention_detection_servers:8.1:*:linux:*:*:*:*:*
    • cpe:2.3:a:symantec:data_loss_prevention_detection_servers:8.1:*:windows:*:*:*:*:*
  • cpe:2.3:a:symantec:data_loss_prevention_endpoint_agents:8.0:*:*:*:*:*:*:*+ 1 more
    • cpe:2.3:a:symantec:data_loss_prevention_endpoint_agents:8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:symantec:data_loss_prevention_endpoint_agents:8.1:*:*:*:*:*:*:*
  • Symantec/Enforce4 versions
    cpe:2.3:a:symantec:enforce:7.0:*:*:*:*:*:*:*+ 3 more
    • cpe:2.3:a:symantec:enforce:7.0:*:*:*:*:*:*:*
    • cpe:2.3:a:symantec:enforce:8.0:*:*:*:*:*:*:*
    • cpe:2.3:a:symantec:enforce:8.1:*:linux:*:*:*:*:*
    • cpe:2.3:a:symantec:enforce:8.1:*:windows:*:*:*:*:*
  • cpe:2.3:a:symantec:mail_security:5.0.0:*:*:*:*:*:*:*+ 15 more
    • cpe:2.3:a:symantec:mail_security:5.0.0:*:*:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:5.0.0.24:*:appliance:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:5.0.0:*:smtp:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:5.0.10:*:microsoft_exchange:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:5.0.1.181:*:smtp:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:5.0.1.182:*:smtp:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:5.0.1.189:*:smtp:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:5.0.11:*:microsoft_exchange:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:5.0.1.200:*:smtp:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:5.0.1:*:smtp:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:5.0:*:appliance:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:6.0.6:microsoft_exchange:*:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:6.0.7:microsoft_exchange:*:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:7.5.3.25:*:domino:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:7.5..4.29:*:domino:*:*:*:*:*
    • cpe:2.3:a:symantec:mail_security:7.5.5.32:*:domino:*:*:*:*:*

Patches

0

No patches discovered yet.

Vulnerability mechanics

AI mechanics synthesis has not run for this CVE yet.

References

18

News mentions

0

No linked articles in our index yet.