9.3
CVSSv2

CVE-2011-1512

Published: 31/05/2011 Updated: 09/10/2018
CVSS v2 Base Score: 9.3 | Impact Score: 10 | Exploitability Score: 8.6
VMScore: 828
Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C

Vulnerability Summary

Heap-based buffer overflow in xlssr.dll in Autonomy KeyView, as used in IBM Lotus Notes prior to 8.5.2 FP3, allows remote malicious users to execute arbitrary code via a malformed BIFF record in a .xls Excel spreadsheet attachment, aka SPR PRAD8E3HKR.

Vulnerable Product Search on Vulmon Subscribe to Product

autonomy keyview

ibm lotus notes 3.0

ibm lotus notes 3.0.0.1

ibm lotus notes 3.0.0.2

ibm lotus notes 4.2

ibm lotus notes 4.2.1

ibm lotus notes 4.2.2

ibm lotus notes 4.5

ibm lotus notes 4.6

ibm lotus notes 4.6.7a

ibm lotus notes 4.6.7h

ibm lotus notes 5.0

ibm lotus notes 5.0.1

ibm lotus notes 5.0.1.02

ibm lotus notes 5.0.1a

ibm lotus notes 5.0.1b

ibm lotus notes 5.0.1c

ibm lotus notes 5.0.2

ibm lotus notes 5.0.2a

ibm lotus notes 5.0.2b

ibm lotus notes 5.0.2c

ibm lotus notes 5.0.3

ibm lotus notes 5.0.4

ibm lotus notes 5.0.4a

ibm lotus notes 5.0.5

ibm lotus notes 5.0.5.01

ibm lotus notes 5.0.5.02

ibm lotus notes 5.0.6

ibm lotus notes 5.0.6a

ibm lotus notes 5.0.6a.01

ibm lotus notes 5.0.7

ibm lotus notes 5.0.7a

ibm lotus notes 5.0.8

ibm lotus notes 5.0.9

ibm lotus notes 5.0.9a

ibm lotus notes 5.0.10

ibm lotus notes 5.0.11

ibm lotus notes 5.0.12

ibm lotus notes 5.0a

ibm lotus notes 5.02

ibm lotus notes 6.0

ibm lotus notes 6.0.1

ibm lotus notes 6.0.2

ibm lotus notes 6.0.2.2

ibm lotus notes 6.0.3

ibm lotus notes 6.0.4

ibm lotus notes 6.0.5

ibm lotus notes 6.5

ibm lotus notes 6.5.1

ibm lotus notes 6.5.2

ibm lotus notes 6.5.3

ibm lotus notes 6.5.3.1

ibm lotus notes 6.5.4

ibm lotus notes 6.5.4.1

ibm lotus notes 6.5.4.2

ibm lotus notes 6.5.4.3

ibm lotus notes 6.5.5

ibm lotus notes 6.5.5.1

ibm lotus notes 6.5.5.2

ibm lotus notes 6.5.5.3

ibm lotus notes 6.5.6

ibm lotus notes 6.5.6.1

ibm lotus notes 6.5.6.2

ibm lotus notes 6.5.6.3

ibm lotus notes 7.0

ibm lotus notes 7.0.0

ibm lotus notes 7.0.1

ibm lotus notes 7.0.1.1

ibm lotus notes 7.0.2

ibm lotus notes 7.0.2.1

ibm lotus notes 7.0.2.2

ibm lotus notes 7.0.2.3

ibm lotus notes 7.0.3

ibm lotus notes 7.0.3.1

ibm lotus notes 7.0.4

ibm lotus notes 7.0.4.0

ibm lotus notes 7.0.4.1

ibm lotus notes 7.0.4.2

ibm lotus notes 8.0

ibm lotus notes 8.0.0

ibm lotus notes 8.0.1

ibm lotus notes 8.0.2

ibm lotus notes 8.0.2.0

ibm lotus notes 8.0.2.1

ibm lotus notes 8.0.2.2

ibm lotus notes 8.0.2.3

ibm lotus notes 8.0.2.4

ibm lotus notes 8.0.2.5

ibm lotus notes 8.0.2.6

ibm lotus notes 8.5

ibm lotus notes 8.5.0.0

ibm lotus notes 8.5.0.1

ibm lotus notes 8.5.1

ibm lotus notes 8.5.1.0

ibm lotus notes 8.5.1.1

ibm lotus notes 8.5.1.2

ibm lotus notes 8.5.1.3

ibm lotus notes 8.5.1.4

ibm lotus notes 8.5.1.5

ibm lotus notes 8.5.2.0

ibm lotus notes 8.5.2.1

ibm lotus notes

Vendor Advisories

Multiple sources have identified several security issues in Autonomy’s Verity Keyview Content Filter libraries  Symantec has updated the Keyview modules being shipped with Symantec products to address these issues ...