Vulnerability Name:

CVE-2012-6349 (CCN-80669)

Assigned:2012-12-16
Published:2013-03-21
Updated:2013-07-29
Summary:Buffer overflow in the .mdb parser in Autonomy KeyView IDOL, as used in IBM Notes 8.5.x before 8.5.3 FP4, allows remote attackers to execute arbitrary code via a crafted file, aka SPR KLYH92XL3W.
CVSS v3 Severity:10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:9.3 High (CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
9.3 High (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C)
6.9 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-119
Vulnerability Consequences:Gain Access
References:Source: MITRE
Type: CNA
CVE-2012-6349

Source: CONFIRM
Type: Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21627992

Source: CCN
Type: IBM Security Bulletin 1627992
Security vulnerabilities addressed in IBM Notes 9.0 (CVE-2011-3026, CVE-2012-6349, CVE-2012-6277)

Source: CCN
Type: BID-58650
IBM Lotus Notes Autonomy KeyView File Parser Buffer Overflow Vulnerability

Source: XF
Type: UNKNOWN
lotus-notes-mdb-bo(80669)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:autonomy:keyview_idol:-:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.3.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.3.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.3.3:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:ibm:lotus_notes:8.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.2.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:lotus_notes:8.5.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    autonomy keyview idol -
    ibm lotus notes 8.5
    ibm lotus notes 8.5.0.0
    ibm lotus notes 8.5.0.1
    ibm lotus notes 8.5.1
    ibm lotus notes 8.5.1.0
    ibm lotus notes 8.5.1.1
    ibm lotus notes 8.5.1.2
    ibm lotus notes 8.5.1.3
    ibm lotus notes 8.5.1.4
    ibm lotus notes 8.5.1.5
    ibm lotus notes 8.5.2.0
    ibm lotus notes 8.5.2.1
    ibm lotus notes 8.5.2.2
    ibm lotus notes 8.5.2.3
    ibm lotus notes 8.5.3
    ibm lotus notes 8.5.3.1
    ibm lotus notes 8.5.3.2
    ibm lotus notes 8.5.3.3
    ibm lotus notes 8.5
    ibm lotus notes 8.5.1
    ibm lotus notes 8.5.2.0
    ibm lotus notes 8.5.3