Vulnerability Note VU#126159
Autonomy Keyview IDOL contains multiple vulnerabilities in file parsers
Autonomy Keyview IDOL contains multiple vulnerabilities in file parsers. These vulnerabilities could allow a remote attacker to execute arbitrary code on an affected system.
Autonomy Keyview IDOL is a set of libraries that can decode over 1,000 different file formats. The Autonomy Keyview IDOL libraries are used by a variety of applications, including IBM Lotus Notes, Lotus Domino, Symantec Mail Security, Hyland OnBase, and many others. These vulnerabilities result from a number of underlying issues. Some of these cases demonstrated memory corruption with attacker-controlled input and could be exploited to run arbitrary code. For example, code execution was verified by CERT/CC for a stack buffer overflow in the .WRI file parser.
By causing an application to process a specially-crafted file with the Autonomy Keyview IDOL library, a remote, unauthenticated attacker may be able to cause an affected application to crash, resulting in a denial of service, or executing arbitrary code with the privileges of the vulnerable application. Depending on what application is using Keyview IDOL, these may happen as the result of some user interaction, such as single-clicking on a file, or it may happen with no user interaction at all.
Apply an Update
Autonomy has released version 10.13.1 of Keyview IDOL to address these issues.
Use the Microsoft Enhanced Mitigation Experience Toolkit
;188=xlssr.dll ---> this would be the result of the Excel dll commented out
Workaround for Symantec Mail Security
Symantec Mail Security is susceptible only if the attachment content scanning option is enabled.
To disable the content filtering rules for Symantec Mail Security for Microsoft Exchange:
Vendor Information (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Autonomy||Affected||03 Feb 2011||18 Mar 2011|
|CA Technologies||Affected||-||21 Mar 2012|
|EMC Corporation||Affected||16 Mar 2011||30 Mar 2012|
|Hyland Software||Affected||18 Mar 2011||18 Mar 2011|
|Lotus Software||Affected||07 Feb 2011||18 Mar 2011|
|McAfee||Affected||08 Mar 2012||21 Mar 2012|
|Palisade Systems||Affected||-||04 Jun 2012|
|Proofpoint||Affected||-||22 May 2012|
|Symantec||Affected||07 Feb 2011||21 Mar 2012|
|Trend Micro||Affected||-||22 May 2012|
|Verdasys||Affected||-||04 Jun 2012|
|WebSense||Affected||29 Mar 2012||18 Apr 2012|
|Adobe||Not Affected||16 Mar 2011||18 Mar 2011|
|Cisco Systems, Inc.||Unknown||16 Mar 2011||30 Mar 2012|
|Citrix||Unknown||16 Mar 2011||16 Mar 2011|
CVSS Metrics (Learn More)
These vulnerabilities were reported by Will Dormann and Jared Allar of the CERT/CC.
This document was written by Jared Allar.
- CVE IDs: Unknown
- Date Public: 07 Jun 2011
- Date First Published: 07 Jun 2011
- Date Last Updated: 04 Jun 2012
- Severity Metric: 50.18
- Document Revision: 80
If you have feedback, comments, or additional information about this vulnerability, please send us email.