Search criteria

74 vulnerabilities found for sendmail by Sendmail

VAR-200310-0072

Vulnerability from variot - Updated: 2025-12-22 20:29

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. sendmail A buffer overflow vulnerability was discovered in the email address parsing process. This vulnerability CERT Advisory CA-2003-07, CA-2003-12 This is a new vulnerability that differs from the vulnerability reported in. As for the vulnerability, there is a possibility that a third party may obtain administrator authority from a remote location. This problem, sendmail Occurs by receiving a message with a maliciously configured email address. For this reason, LAN Is running on a host sendmail Even other MTA (Mail Transfer Agent) If you receive a malicious message relayed from, you may be affected by the vulnerability.Service operation interruption (denial-of-service, DoS) An attacker or a remote third party may gain administrative privileges. This issue is different than the vulnerability described in BID 7230. Sendmail is one of the most popular mail transfer agents (MTAs) on the Internet. The local exploitation method on Linux can use recipient.c and sendtolist() to overwrite the pointer with the data submitted by the user. When calling the free() function, the command may be redirected, and the attacker can construct a malicious email message and submit it to Sendmail for analysis. Execute arbitrary commands on the system with Sendmail process privileges. There may also be other exploit methods, and it is also possible to exploit this vulnerability remotely

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200310-0072",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.6.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.5"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.1"
      },
      {
        "model": "advanced server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.6"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.4.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "1.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "0.7"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "0.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "9.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.17m"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk3_bl17"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.19f"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.4"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.20m"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk4_bl18"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.18f"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk5_bl19"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.0.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b_pk1_bl1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g_pk4_bl22"
      },
      {
        "model": "pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk7_bl18"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.00"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk2_bl2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk3_bl3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.1a"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk4_bl21"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.17f"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.3"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b_pk2_bl22"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.4"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.7"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.21m"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.9"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk5_bl23"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g_pk3_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk6_bl20"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.21f"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "3.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk8_bl22"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.8"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk1_bl1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.6"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.19m"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.18m"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "8.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk6_bl17"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.20f"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.0"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "conectiva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm eserver",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mandrakesoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "secure computing",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sendmail consortium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "turbolinux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wirex",
        "version": null
      },
      {
        "model": "cobalt raq4",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "openlinux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "3.1.1 (server)"
      },
      {
        "model": "open unix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "8.0.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (sparc)"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "3.0.x (solaris"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.00"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "linux"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.0"
      },
      {
        "model": "systemwalker it budgetmgr",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix edition )"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "8.0"
      },
      {
        "model": "for nt",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.6.x"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.3"
      },
      {
        "model": "systemwalker listcreator",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "openbsd",
        "version": "3.3"
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.12.9 and earlier"
      },
      {
        "model": "for nt",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "version 3.0.x"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "7.1.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.2.xj (windows nt/2000 edition )"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.2.x (solaris"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.1"
      },
      {
        "model": "openbsd",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "openbsd",
        "version": "version"
      },
      {
        "model": "linux advanced workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "linux"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix edition )"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "9"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.11"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "windows nt/2000"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.2"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "1.3 (windows 2000 edition )"
      },
      {
        "model": "teamware office",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.22"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.23"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sgi",
        "version": "6.5 (6.5.15 - 6.5.21f)"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.1.x (solaris"
      },
      {
        "model": "openlinux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "3.1.1 (workstation)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "3.1.x (solaris"
      },
      {
        "model": "bsd/os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "fore tune",
        "version": "5.0"
      },
      {
        "model": "cobalt qube3",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "interstage office square",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (ws)"
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "openbsd",
        "version": "3.2"
      },
      {
        "model": "gnu/linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "debian",
        "version": "3.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.1.x (hp-ux edition )"
      },
      {
        "model": "freebsd",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "freebsd",
        "version": "version"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.0"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "7.1.3"
      },
      {
        "model": "cobalt raqxtr",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (x86)"
      },
      {
        "model": "linux 5.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "turbolinux advanced server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (as)"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.04"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "bsd/os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "fore tune",
        "version": "4.3.1"
      },
      {
        "model": "gnu/linux",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "debian",
        "version": "version"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (es)"
      },
      {
        "model": "systemwalker listworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.0.x (solaris"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "s390 linux edition )"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "1.2 (solaris"
      },
      {
        "model": "systemwalker ip netmgr",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "s390 linux edition )"
      },
      {
        "model": "cobalt raq550",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "4.3"
      },
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "9"
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 7.0 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 2.6 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.0.7"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "550"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.21"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.21"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "inc sendmail pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "inc sendmail pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.9"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "consortium sendmail beta7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "beta",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5x86"
      },
      {
        "model": "sh3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "linux rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.1"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "-release-p5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "-release-p14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "-prerelease",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "-release-p7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "-release-p17",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "-release-p20",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "-release-p32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "-release-p42",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "-release-p38",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "3.0"
      },
      {
        "model": "tru64 b pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 b pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 g pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 g pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f pk8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f pk7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.22"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.10"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:debian:debian_linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:freebsd:freebsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ibm:aix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:netbsd:netbsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:openbsd:openbsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sco:open_unix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sco:openlinux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sco:unixware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sgi:irix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_qube_3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_4",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_550",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_xtr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sun:linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sun:solaris",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_advanced_message_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_for_nt",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_advanced_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_workstation",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:hp-ux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:bsdi:bsd_os",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:linux_advanced_workstation",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage_office_square",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_ip_netmgr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_it_budgetmgr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_listcreator",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_listworks",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:teamware_office",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michal Zalewski\u203b lcamtuf@echelon.pl",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2003-0694",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2003-0694",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-7519",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2003-0694",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#784980",
            "trust": 0.8,
            "value": "36.72"
          },
          {
            "author": "NVD",
            "id": "CVE-2003-0694",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200310-019",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-7519",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2003-0694",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. sendmail A buffer overflow vulnerability was discovered in the email address parsing process. This vulnerability CERT Advisory CA-2003-07, CA-2003-12 This is a new vulnerability that differs from the vulnerability reported in. As for the vulnerability, there is a possibility that a third party may obtain administrator authority from a remote location. This problem, sendmail Occurs by receiving a message with a maliciously configured email address. For this reason, LAN Is running on a host sendmail Even other MTA (Mail Transfer Agent) If you receive a malicious message relayed from, you may be affected by the vulnerability.Service operation interruption (denial-of-service, DoS) An attacker or a remote third party may gain administrative privileges.  This issue is different than the vulnerability described in BID 7230. Sendmail is one of the most popular mail transfer agents (MTAs) on the Internet. The local exploitation method on Linux can use recipient.c and sendtolist() to overwrite the pointer with the data submitted by the user. When calling the free() function, the command may be redirected, and the attacker can construct a malicious email message and submit it to Sendmail for analysis. Execute arbitrary commands on the system with Sendmail process privileges. There may also be other exploit methods, and it is also possible to exploit this vulnerability remotely",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      },
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#784980",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "8641",
        "trust": 1.3
      },
      {
        "db": "XF",
        "id": "13204",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019",
        "trust": 0.7
      },
      {
        "db": "CONECTIVA",
        "id": "CLA-2003:742",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:284",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:283",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2003-25",
        "trust": 0.6
      },
      {
        "db": "VULNWATCH",
        "id": "20030917 ZALEWSKI ADVISORY - SENDMAIL 8.12.9 PRESCAN BUG",
        "trust": 0.6
      },
      {
        "db": "SCO",
        "id": "SCOSA-2004.11",
        "trust": 0.6
      },
      {
        "db": "MANDRAKE",
        "id": "MDKSA-2003:092",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030917 GLSA: SENDMAIL (200309-13)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030917 [SLACKWARE-SECURITY] SENDMAIL VULNERABILITIES FIXED (SSA:2003-260-02)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030917 SENDMAIL 8.12.9 PRESCAN BUG (A NEW ONE) [CAN-2003-0694]",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030919 [OPENPKG-SA-2003.041] OPENPKG SECURITY ADVISORY (SENDMAIL)",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:603",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:2975",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:572",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20030917 SENDMAIL 8.12.9 PRESCAN BUG (A NEW ONE) [CAN-2003-0694]",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-384",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "id": "VAR-200310-0072",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-12-22T20:29:58.312000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "ca-2003-25",
        "trust": 0.8,
        "url": "http://software.fujitsu.com/jp/security/vulnerabilities/cert/cert2003.html#ca-2003-25"
      },
      {
        "title": "DSA-384-1",
        "trust": 0.8,
        "url": "http://www.debian.org/security/2003/dsa-384"
      },
      {
        "title": "FreeBSD-SA-03:13.sendmail ",
        "trust": 0.8,
        "url": "http://security.freebsd.org/advisories/FreeBSD-SA-03:13.sendmail.asc"
      },
      {
        "title": "HPSBUX00281",
        "trust": 0.8,
        "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01035741"
      },
      {
        "title": "IY48657",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY48657"
      },
      {
        "title": "IY48659",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY48659"
      },
      {
        "title": "IY48658",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY48658"
      },
      {
        "title": "MSS-OAR-E01-2003.1473.1",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/MSS/MSS-OAR-E01-2003.1473.1"
      },
      {
        "title": "sendmail (V2.x)",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/update/linux/list.php?errata_id=150"
      },
      {
        "title": "NetBSD-SA2003-016",
        "trust": 0.8,
        "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-016.txt.asc"
      },
      {
        "title": "018: SECURITY FIX: September 17, 2003",
        "trust": 0.8,
        "url": "http://www.openbsd.org/errata32.html#sendmail4"
      },
      {
        "title": "005: SECURITY FIX: September 17, 2003",
        "trust": 0.8,
        "url": "http://www.openbsd.org/errata33.html#sendmail"
      },
      {
        "title": "RHSA-2003:283",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2003-283.html"
      },
      {
        "title": "RHSA-2003:284",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2003-284.html"
      },
      {
        "title": "CSSA-2003-036.0",
        "trust": 0.8,
        "url": "ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-036.0.txt"
      },
      {
        "title": "CSSA-2003-SCO.23.1",
        "trust": 0.8,
        "url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.23/CSSA-2003-SCO.23.txt"
      },
      {
        "title": "8.12.10",
        "trust": 0.8,
        "url": "http://www.sendmail.org/8.12.10.html"
      },
      {
        "title": "2003-9-17",
        "trust": 0.8,
        "url": "http://www.sendmail.com/security/"
      },
      {
        "title": "20030903-01-P",
        "trust": 0.8,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20030903-01-P.asc"
      },
      {
        "title": "56922",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-1"
      },
      {
        "title": "56860",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56860-1"
      },
      {
        "title": "56922",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-3"
      },
      {
        "title": "56860",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56860-3"
      },
      {
        "title": "XTR Sendmail Security Update 1.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "550 Sendmail Security Update 0.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "4 Sendmail Security Update 2.0.2",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "TLSA-2003-52",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2003/TLSA-2003-52.txt"
      },
      {
        "title": "Sendmail Inc. Information for VU#784980",
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/AAMN-5RHQ64"
      },
      {
        "title": "M500-012",
        "trust": 0.8,
        "url": "ftp://ftp.foretune.co.jp/pub/BSDOS/patches-5.0/M500-012.ia32"
      },
      {
        "title": "M431-011",
        "trust": 0.8,
        "url": "ftp://ftp.foretune.co.jp/pub/BSDOS/patches-4.3.1/i386/M431-011"
      },
      {
        "title": "RHSA-2003:283",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-283J.html"
      },
      {
        "title": "RHSA-2003:284",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-284J.html"
      },
      {
        "title": "TLSA-2003-52",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2003/TLSA-2003-52j.txt"
      },
      {
        "title": "Debian Security Advisories: DSA-384-1 sendmail -- buffer overflows",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=243b978e3f17d13dd590ac7cfc4a472f"
      },
      {
        "title": "cumes",
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes "
      },
      {
        "title": "x0rzEQGRP",
        "trust": 0.1,
        "url": "https://github.com/happysmack/x0rzEQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Nekkidso/EQGRP "
      },
      {
        "title": "test",
        "trust": 0.1,
        "url": "https://github.com/DevKosov/test "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/hackcrypto/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Ninja-Tw1sT/EQGRP "
      },
      {
        "title": "leaked2",
        "trust": 0.1,
        "url": "https://github.com/kongjiexi/leaked2 "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/391861737/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Muhammd/EQGRP "
      },
      {
        "title": "ShadowBrokersFiles",
        "trust": 0.1,
        "url": "https://github.com/R3K1NG/ShadowBrokersFiles "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/CKmaenn/EQGRP "
      },
      {
        "title": "EQGRP_Linux",
        "trust": 0.1,
        "url": "https://github.com/CybernetiX-S3C/EQGRP_Linux "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/IHA114/EQGRP "
      },
      {
        "title": "ShadowBrokersFiles",
        "trust": 0.1,
        "url": "https://github.com/antiscammerarmy/ShadowBrokersFiles "
      },
      {
        "title": "shadowbrokerstuff",
        "trust": 0.1,
        "url": "https://github.com/thetrentusdev/shadowbrokerstuff "
      },
      {
        "title": "bdhglopoj",
        "trust": 0.1,
        "url": "https://github.com/maxcvnd/bdhglopoj "
      },
      {
        "title": "shadowbrokerstuff",
        "trust": 0.1,
        "url": "https://github.com/shakenetwork/shadowbrokerstuff "
      },
      {
        "title": "x0rz-EQGRP",
        "trust": 0.1,
        "url": "https://github.com/r3p3r/x0rz-EQGRP "
      },
      {
        "title": "ShadowBrokersStuff",
        "trust": 0.1,
        "url": "https://github.com/thetrentus/ShadowBrokersStuff "
      },
      {
        "title": "EQ1",
        "trust": 0.1,
        "url": "https://github.com/thePevertedSpartan/EQ1 "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Badbug6/EQGRP "
      },
      {
        "title": "EQGRP-nasa",
        "trust": 0.1,
        "url": "https://github.com/Soldie/EQGRP-nasa "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Mofty/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/thetrentus/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/NamanGangwar/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/x0rz/EQGRP "
      },
      {
        "title": "SB--.-HACK-the-EQGRP-1",
        "trust": 0.1,
        "url": "https://github.com/cipherreborn/SB--.-HACK-the-EQGRP-1 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.9,
        "url": "http://www.cert.org/advisories/ca-2003-25.html"
      },
      {
        "trust": 2.7,
        "url": "http://www.kb.cert.org/vuls/id/784980"
      },
      {
        "trust": 2.6,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html"
      },
      {
        "trust": 2.6,
        "url": "http://www.sendmail.org/8.12.10.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2003/dsa-384"
      },
      {
        "trust": 1.8,
        "url": "http://www.mandriva.com/security/advisories?name=mdksa-2003:092"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-283.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-284.html"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.11/scosa-2004.11.txt"
      },
      {
        "trust": 1.8,
        "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html"
      },
      {
        "trust": 1.7,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742"
      },
      {
        "trust": 1.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2975"
      },
      {
        "trust": 1.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a572"
      },
      {
        "trust": 1.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a603"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106382859407683\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106381604923204\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2"
      },
      {
        "trust": 0.9,
        "url": "http://www.securityfocus.com/bid/8641"
      },
      {
        "trust": 0.8,
        "url": "http://archives.neohapsis.com/archives/sendmail/2003-q3/0002.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org/patches/parse8.359.2.8"
      },
      {
        "trust": 0.8,
        "url": "http://www.ciac.org/ciac/bulletins/n-149.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0694"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/13204"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr033901.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr034001.txt"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-25"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trca-2003-25"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0694"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030918_190150.html"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106398718909274\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106383437615742\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106382859407683\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106381604923204\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:603"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:572"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2975"
      },
      {
        "trust": 0.3,
        "url": "http://www-1.ibm.com/servers/aix/"
      },
      {
        "trust": 0.3,
        "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000746"
      },
      {
        "trust": 0.3,
        "url": "http://www.sendmail.org/"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56860"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56922"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/qube3.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/patches/linux/security.html"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v4.0g/t64kit0020132-v40gb22-es-20031001.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-553-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-563-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-586-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-594-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/337839"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106383437615742\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106381604923204\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106382859407683\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106398718909274\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000742"
      },
      {
        "trust": 0.1,
        "url": ""
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/./dsa-384"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-17T00:00:00",
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "date": "2003-09-17T00:00:00",
        "db": "BID",
        "id": "8641"
      },
      {
        "date": "2003-09-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "date": "2003-10-06T04:00:00",
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-29T00:00:00",
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "date": "2009-07-11T23:56:00",
        "db": "BID",
        "id": "8641"
      },
      {
        "date": "2006-08-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "date": "2007-08-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sendmail prescan() buffer overflow vulnerability",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      }
    ],
    "trust": 0.9
  }
}

VAR-200310-0080

Vulnerability from variot - Updated: 2025-04-03 22:39

A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences. This vulnerability could allow a remote attacker to execute arbitrary code or cause a denial of service on a vulnerable system.This vulnerability does not affect the default configuration. Note that Sendmail under a default configuration is not vulnerable to this issue

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200310-0080",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.5"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.1"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "advanced server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "1.2"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.22"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "0.7"
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openbsd",
        "version": "3.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.4.3"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openbsd",
        "version": "3.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.6.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "0.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.4"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.0.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.00"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.1a"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.3"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.9"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.0"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.12.9"
      },
      {
        "model": "cobalt qube3",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raq4",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raq550",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raqxtr",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "linux 5.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "turbolinux advanced server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.1"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.5"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.0"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.00"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.04"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.11"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.23"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "8.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "9"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "tru64 f pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "consortium sendmail beta10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "hp-ux b.11.23",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "tru64 pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.10"
      },
      {
        "model": "nonstop-ux whitney",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.22",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "linux rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "linux rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.23"
      },
      {
        "model": "consortium sendmail beta5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.7"
      },
      {
        "model": "tru64 g pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail beta16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5x86"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "tru64 b pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "hp-ux b.11.04",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "tru64 a pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.8"
      },
      {
        "model": "tru64 g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "nonstop-ux puma",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "beta",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "tru64 f pk7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "tru64 pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 f pk8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "consortium sendmail beta12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "sh3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "altavista firewall avfw98",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "tru64 a pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 b pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.9"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.4"
      },
      {
        "model": "consortium sendmail beta7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "hp-ux b.11.11",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "tru64 a pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux b.11.00",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "alphaserver sc",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "tru64 pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "linux a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "tru64 g pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.9"
      },
      {
        "model": "linux rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "consortium sendmail",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.10"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "altavista firewall raptor ec",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_qube_3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_4",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_550",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_xtr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sun:linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sun:solaris",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_advanced_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_workstation",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:hp-ux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:linux",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Discovery of this vulnerability has been credited to Timo Sirainen.",
    "sources": [
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2003-0681",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2003-0681",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-7506",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2003-0681",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#108964",
            "trust": 0.8,
            "value": "6.33"
          },
          {
            "author": "NVD",
            "id": "CVE-2003-0681",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200310-016",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-7506",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2003-0681",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A \"potential buffer overflow in ruleset parsing\" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences. This vulnerability could allow a remote attacker to execute arbitrary code or cause a denial of service on a vulnerable system.This vulnerability does not affect the default configuration. Note that Sendmail under a default configuration is not vulnerable to this issue",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      },
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      }
    ],
    "trust": 2.79
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-7506",
        "trust": 0.1,
        "type": "unknown"
      },
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=23154",
        "trust": 0.1,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2003-0681",
        "trust": 2.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#108964",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "8649",
        "trust": 2.3
      },
      {
        "db": "XF",
        "id": "13216",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016",
        "trust": 0.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "23154",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76930",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "id": "VAR-200310-0080",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T22:39:57.854000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HPSBUX00281",
        "trust": 0.8,
        "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01035741"
      },
      {
        "title": "RHSA-2003:283",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2003-283.html"
      },
      {
        "title": "8.12.10",
        "trust": 0.8,
        "url": "http://www.sendmail.org/8.12.10.html"
      },
      {
        "title": "57573",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57573-1"
      },
      {
        "title": "56922",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-1"
      },
      {
        "title": "57573",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57573-3"
      },
      {
        "title": "56922",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-3"
      },
      {
        "title": "4 Sendmail Security Update 2.0.2",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "XTR Sendmail Security Update 1.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "550 Sendmail Security Update 0.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "TLSA-2003-52",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2003/TLSA-2003-52.txt"
      },
      {
        "title": "RHSA-2003:283",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-283J.html"
      },
      {
        "title": "TLSA-2003-52",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2003/TLSA-2003-52j.txt"
      },
      {
        "title": "Debian Security Advisories: DSA-384-1 sendmail -- buffer overflows",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=243b978e3f17d13dd590ac7cfc4a472f"
      },
      {
        "title": "x0rzEQGRP",
        "trust": 0.1,
        "url": "https://github.com/happysmack/x0rzEQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Nekkidso/EQGRP "
      },
      {
        "title": "test",
        "trust": 0.1,
        "url": "https://github.com/DevKosov/test "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/hackcrypto/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Ninja-Tw1sT/EQGRP "
      },
      {
        "title": "leaked2",
        "trust": 0.1,
        "url": "https://github.com/kongjiexi/leaked2 "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/391861737/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Muhammd/EQGRP "
      },
      {
        "title": "ShadowBrokersFiles",
        "trust": 0.1,
        "url": "https://github.com/R3K1NG/ShadowBrokersFiles "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/CKmaenn/EQGRP "
      },
      {
        "title": "EQGRP_Linux",
        "trust": 0.1,
        "url": "https://github.com/CybernetiX-S3C/EQGRP_Linux "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/IHA114/EQGRP "
      },
      {
        "title": "ShadowBrokersFiles",
        "trust": 0.1,
        "url": "https://github.com/antiscammerarmy/ShadowBrokersFiles "
      },
      {
        "title": "shadowbrokerstuff",
        "trust": 0.1,
        "url": "https://github.com/thetrentusdev/shadowbrokerstuff "
      },
      {
        "title": "bdhglopoj",
        "trust": 0.1,
        "url": "https://github.com/maxcvnd/bdhglopoj "
      },
      {
        "title": "shadowbrokerstuff",
        "trust": 0.1,
        "url": "https://github.com/shakenetwork/shadowbrokerstuff "
      },
      {
        "title": "x0rz-EQGRP",
        "trust": 0.1,
        "url": "https://github.com/r3p3r/x0rz-EQGRP "
      },
      {
        "title": "ShadowBrokersStuff",
        "trust": 0.1,
        "url": "https://github.com/thetrentus/ShadowBrokersStuff "
      },
      {
        "title": "EQ1",
        "trust": 0.1,
        "url": "https://github.com/thePevertedSpartan/EQ1 "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Badbug6/EQGRP "
      },
      {
        "title": "EQGRP-nasa",
        "trust": 0.1,
        "url": "https://github.com/Soldie/EQGRP-nasa "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Mofty/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/thetrentus/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/NamanGangwar/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/x0rz/EQGRP "
      },
      {
        "title": "SB--.-HACK-the-EQGRP-1",
        "trust": 0.1,
        "url": "https://github.com/cipherreborn/SB--.-HACK-the-EQGRP-1 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.securityfocus.com/bid/8649"
      },
      {
        "trust": 2.0,
        "url": "http://www.kb.cert.org/vuls/id/108964"
      },
      {
        "trust": 1.5,
        "url": "http://www.sendmail.org/8.12.10.html"
      },
      {
        "trust": 1.2,
        "url": "http://www.debian.org/security/2003/dsa-384"
      },
      {
        "trust": 1.2,
        "url": "http://www.mandriva.com/security/advisories?name=mdksa-2003:092"
      },
      {
        "trust": 1.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a3606"
      },
      {
        "trust": 1.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a595"
      },
      {
        "trust": 1.2,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-283.html"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13216"
      },
      {
        "trust": 1.1,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.com"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0681"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/13216"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0681"
      },
      {
        "trust": 0.3,
        "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000746"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56922"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57573"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/qube3.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106383437615742\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106398718909274\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000742"
      },
      {
        "trust": 0.1,
        "url": ""
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.exploit-db.com/exploits/23154/"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/hackcrypto/eqgrp"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/./dsa-384"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-18T00:00:00",
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "date": "2003-09-17T00:00:00",
        "db": "BID",
        "id": "8649"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "date": "2003-10-06T04:00:00",
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-18T00:00:00",
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "date": "2018-05-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "date": "2018-05-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "date": "2007-09-22T00:30:00",
        "db": "BID",
        "id": "8649"
      },
      {
        "date": "2007-08-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "date": "2006-08-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sendmail Ruleset Parsing Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      }
    ],
    "trust": 0.6
  }
}

VAR-200304-0013

Vulnerability from variot - Updated: 2025-04-03 21:38

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. Sendmail contains a buffer overflow in code that parses email addresses. A remote attacker could execute arbitrary code or cause a denial of service on a vulnerable system. The flaw is present in the 'prescan()' procedure, which is used for processing email addresses in SMTP headers. This vulnerability stems from a logic error in the conversion of a char to an integer value. The issue has been fixed Sendmail 8.12.9. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. Sendmail is one of the most popular MTAs. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\% to 75\% of the total. Many UNIX and Linux workstations run Sendmail by default. This vulnerability exists in the prescan() process. The vulnerability is for messages, not connections. This means that the vulnerability is triggered by the content of a specially crafted email message, rather than by lower-level network communications. This is important because a non-vulnerable MTA can send malicious messages along with other protected MTAs in the network. In other words, even if the software used by the boundary MTA of the site is not sendmail, the sendmail service program with loopholes inside the network is still threatened. Messages that exploit this vulnerability can also pass through many common packet filters or firewalls undetected

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200304-0013",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "10.24"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.01"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.10"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.34"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.0.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.30"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.6"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.26"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.16"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.20"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.5"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.4"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "4.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "9.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk3_bl17"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.00"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0_pk4_bl18"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk4_bl18"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "hp-ux series 700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk5_bl19"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b_pk1_bl1"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.5.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0a"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0d_pk9_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0d"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk7_bl18"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.00"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0b"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.08"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0_pk4_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk2_bl2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk3_bl3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.7"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g_pk3_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk6_bl20"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0a_pk3_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "sis",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.09"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk1_bl1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "hp-ux series 800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "8.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0f"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk6_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "conectiva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mandrakesoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mirapoint",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nortel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sequent ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sendmail consortium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wind river",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wirex",
        "version": null
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.11.6"
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.12.8"
      },
      {
        "model": "cobalt raq4",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raq550",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raqxtr",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "2.6 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "2.6 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "advanced message server",
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.1.x"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.2.x"
      },
      {
        "model": "turbolinux advanced server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.1"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.5"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.0"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.10"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.00"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.11"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.04"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "6.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "8.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "9"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "hp-ux sis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "z/os v1r4",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "os/390 v2r6",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tru64 f pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "consortium sendmail beta10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.2"
      },
      {
        "model": "tru64 pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "mac os",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "nonstop-ux whitney",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.22",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.0"
      },
      {
        "model": "z/os",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "os/390 v2r9",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "solaris x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.9"
      },
      {
        "model": "hp-ux series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20700"
      },
      {
        "model": "advanced workstation for the itanium processor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "z/os v1r2",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "consortium sendmail beta5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.5"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.7"
      },
      {
        "model": "tru64 g pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 d pk9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail beta16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "os/390 v2r8",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "solaris 2.6 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "hp-ux b.11.04",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "aix l",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "solaris 2.4 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "cobalt raq 4100r",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "550"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "tru64 d",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.8"
      },
      {
        "model": "tru64 g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "nonstop-ux puma",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "9"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "tru64 f pk7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "openlinux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "3.1.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "tru64 pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "cobalt qube3 4000wg",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.8"
      },
      {
        "model": "mac os server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "consortium sendmail beta12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "os/390 v2r10",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "altavista firewall avfw98",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "tru64 b pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.9"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "solaris 2.5 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "openlinux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "3.1.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.4"
      },
      {
        "model": "consortium sendmail beta7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "hp-ux b.11.11",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "tru64 a pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux b.11.00",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "solaris 7.0 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "solaris 9 x86 update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2"
      },
      {
        "model": "lx50",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.0"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "alphaserver sc",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "tru64 pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "solaris ppc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "hp-ux series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20800"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "mvs",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "cobalt raq4 3001r",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "cobalt raq xtr 3500r",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "altavista firewall raptor ec",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:ibm:aix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_4",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_550",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_xtr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sun:solaris",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_advanced_message_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_advanced_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_workstation",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:hp-ux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:vvos",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:linux",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michal Zalewski\u203b lcamtuf@dione.ids.pl",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2003-0161",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2003-0161",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-6991",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2003-0161",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#897604",
            "trust": 0.8,
            "value": "67.20"
          },
          {
            "author": "NVD",
            "id": "CVE-2003-0161",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200304-025",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-6991",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2003-0161",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. Sendmail contains a buffer overflow in code that parses email addresses.  A remote attacker could execute arbitrary code or cause a denial of service on a vulnerable system. The flaw is present in the \u0027prescan()\u0027 procedure, which is used for processing email addresses in SMTP headers.  This vulnerability stems from a logic error in the conversion of a char to an integer value. The issue has been fixed Sendmail 8.12.9. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. Sendmail is one of the most popular MTAs. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\\\\% to 75\\\\% of the total. Many UNIX and Linux workstations run Sendmail by default. This vulnerability exists in the prescan() process. The vulnerability is for messages, not connections. This means that the vulnerability is triggered by the content of a specially crafted email message, rather than by lower-level network communications. This is important because a non-vulnerable MTA can send malicious messages along with other protected MTAs in the network. In other words, even if the software used by the boundary MTA of the site is not sendmail, the sendmail service program with loopholes inside the network is still threatened. Messages that exploit this vulnerability can also pass through many common packet filters or firewalls undetected",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      },
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      }
    ],
    "trust": 2.79
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=24",
        "trust": 0.2,
        "type": "exploit"
      },
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-6991",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#897604",
        "trust": 3.7
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "7230",
        "trust": 2.9
      },
      {
        "db": "XF",
        "id": "11653",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025",
        "trust": 0.7
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:121",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:120",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-278",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-290",
        "trust": 0.6
      },
      {
        "db": "SCO",
        "id": "SCOSA-2004.11",
        "trust": 0.6
      },
      {
        "db": "IMMUNIX",
        "id": "IMNX-2003-7+-002-01",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "52620",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "52700",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "1001088",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030329 SENDMAIL 8.12.9 AVAILABLE",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030520 [FWD: 127 RESEARCH AND DEVELOPMENT: 127 DAY!]",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030331 GLSA: SENDMAIL (200303-27)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030329 SENDMAIL: -1 GONE WILD",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030330 [OPENPKG-SA-2003.027] OPENPKG SECURITY ADVISORY (SENDMAIL)",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20030329 SENDMAIL: -1 GONE WILD",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2003-12",
        "trust": 0.6
      },
      {
        "db": "CONECTIVA",
        "id": "CLA-2003:614",
        "trust": 0.6
      },
      {
        "db": "SGI",
        "id": "20030401-01-P",
        "trust": 0.6
      },
      {
        "db": "CALDERA",
        "id": "CSSA-2003-016.0",
        "trust": 0.6
      },
      {
        "db": "GENTOO",
        "id": "GLSA-200303-27",
        "trust": 0.6
      },
      {
        "db": "FREEBSD",
        "id": "FREEBSD-SA-03:07",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "24",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-15232",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-62723",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76244",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "22442",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "id": "VAR-200304-0013",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T21:38:17.829000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HPSBUX00253",
        "trust": 0.8,
        "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00958571"
      },
      {
        "title": "HPSBUX0304-253",
        "trust": 0.8,
        "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX0304-253.html"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.ibm.com/jp/"
      },
      {
        "title": "RHSA-2003:120",
        "trust": 0.8,
        "url": "http://rhn.redhat.com/errata/RHSA-2003-120.html"
      },
      {
        "title": "sendmail 8.12.9 available",
        "trust": 0.8,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "title": "52620",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
      },
      {
        "title": "52700",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
      },
      {
        "title": "52700",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-3"
      },
      {
        "title": "52620",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-3"
      },
      {
        "title": "4 Sendmail Security Update 2.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "XTR Sendmail Security Update 1.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "550 Sendmail Security Update 0.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "TLSA-2003-24",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2003/TLSA-2003-24.txt"
      },
      {
        "title": "Sendmail Inc. Information for VU#897604",
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/AAMN-5KUUTZ"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.sendmail.co.jp/"
      },
      {
        "title": "RHSA-2003:120",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-120J.html"
      },
      {
        "title": "TLSA-2003-24",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2003/TLSA-2003-24j.txt"
      },
      {
        "title": "Debian Security Advisories: DSA-290-1 sendmail-wide -- char-to-int conversion",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=8086c3d7d3014252ce37b8626383010c"
      },
      {
        "title": "cumes",
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://www.kb.cert.org/vuls/id/897604"
      },
      {
        "trust": 2.7,
        "url": "http://www.securityfocus.com/bid/7230"
      },
      {
        "trust": 2.6,
        "url": "http://www.cert.org/advisories/ca-2003-12.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/archive/1/321997"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.caldera.com/pub/security/openlinux/cssa-2003-016.0.txt"
      },
      {
        "trust": 1.8,
        "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2003/dsa-278"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2003/dsa-290"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.freebsd.org/pub/freebsd/cert/advisories/freebsd-sa-03:07.sendmail.asc"
      },
      {
        "trust": 1.8,
        "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-march/004295.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-120.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-121.html"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.11/scosa-2004.11.txt"
      },
      {
        "trust": 1.8,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-p"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
      },
      {
        "trust": 1.7,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/archive/1/317135/30/25220/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/archive/1/316773/2003-03-28/2003-04-03/0"
      },
      {
        "trust": 0.8,
        "url": "http://www.iss.net/issen/delivery/xforce/alertdetail.jsp?oid=22127"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org/secure-install.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org/ftp/release_notes"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc2047.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.ciac.org/ciac/bulletins/n-067.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0161"
      },
      {
        "trust": 0.8,
        "url": "http://www.ipa.go.jp/security/ciadr/20030331sendmail.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031401.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031501.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031301.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/at/2003/at030004.txt"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-12"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-07/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0161"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/11653"
      },
      {
        "trust": 0.8,
        "url": "http://www.isskk.co.jp/support/techinfo/general/sendmail033103_xforce.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030330_153031.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030506_122656.html"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104897487512238\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/316961/30/25250/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104914999806315\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f52620"
      },
      {
        "trust": 0.3,
        "url": "http://www.info.apple.com/usen/security/security_updates.html"
      },
      {
        "trust": 0.3,
        "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/mss/mss-oar-e01-2003.0793.1"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://rhn.redhat.com/errata/rhsa-2003-121.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.sendmail.org/"
      },
      {
        "trust": 0.3,
        "url": "http://www.sotlinux.org/en/sotlinux/sa/2003/2003-0019.php"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v4.0f/duv40fb18-c0093400-17811-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1a/t64v51ab21-c0112900-17770-es-20030402.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1b/t64v51bb1-c0008000-17812-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51b20-c0176700-17773-es-20030402.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v4.0g/t64v40gb17-c0029200-17810-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f52700\u0026zone_32=category%3asecurity"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/321997"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/316760"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104897487512238\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104896621106790\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104914999806315\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000614"
      },
      {
        "trust": 0.1,
        "url": ""
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/./dsa-290"
      },
      {
        "trust": 0.1,
        "url": "https://www.exploit-db.com/exploits/24/"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-03-29T00:00:00",
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "date": "2003-04-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "date": "2003-04-02T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "date": "2003-03-29T00:00:00",
        "db": "BID",
        "id": "7230"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "date": "2003-03-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "date": "2003-04-02T05:00:00",
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-25T00:00:00",
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "date": "2007-09-21T23:40:00",
        "db": "BID",
        "id": "7230"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "date": "2010-02-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sendmail address parsing buffer overflow",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.9
  }
}

VAR-200303-0122

Vulnerability from variot - Updated: 2025-04-03 20:39

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. sendmail A buffer overflow vulnerability was discovered in message processing. The vulnerability could allow a third party to gain administrative privileges remotely. This problem, sendmail is caused by receiving a message with maliciously constructed header information. For this reason, LAN is running on a host installed within sendmail Even other MTA (Mail Transfer Agent) You may be affected by the vulnerability if you receive a malicious message relayed from .A third party may be able to remotely obtain administrator privileges. Sendmail is prone to a remotely buffer-overflow vulnerability in the SMTP header parsing component. Successful attackers may exploit this vulnerability to gain control of affected servers. Reportedly, this vulnerability may be locally exploitable if the sendmail binary is setuid/setgid. Sendmail 5.2 to 8.12.7 are affected. Administrators are advised to upgrade to 8.12.8 or to apply patches to earlier versions of the 8.12.x tree. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\% to 75\% of the total. Many UNIX and Linux workstations run Sendmail by default. When an email header contains an address or address list (eg \"From\", \"To\", \"CC\"), Sendmail will attempt to check whether the provided address or address list is valid. Sendmail does this using the crackaddr() function, which is located in the headers.c file in the Sendmail source tree. Sendmail will check this buffer and stop adding data to it if it is found to be full. Sendmail goes through several safety checks to ensure that characters are interpreted correctly. On most Unix or Linux systems, Sendmail runs as the root user. Because the attack code can be included in what appears to be a normal email message, it can easily penetrate many common packet filtering devices or firewalls without being detected. Successful exploitation of an unpatched sendmail system leaves no messages in the syslog. However, on patched systems, attempts to exploit this vulnerability leave the following log message: Dropped invalid comments from header address This vulnerability affects both the commercial and open source versions of Sendmail, and is also reported to have been tested in the lab environment has been successfully exploited

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200303-0122",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.10"
      },
      {
        "model": "sendmail",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "sendmail",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.0.4"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.8"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "platform sa",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "1.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "8"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.7"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.00"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "bsdos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "4.2"
      },
      {
        "model": "alphaserver sc",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "2.6"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "7.0"
      },
      {
        "model": "sendmail",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "9"
      },
      {
        "model": "sendmail",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "sendmail",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "bsdos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "4.3.1"
      },
      {
        "model": "bsdos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "5.0"
      },
      {
        "model": "alphaserver sc",
        "scope": null,
        "trust": 0.9,
        "vendor": "hp",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "bsd os",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "conectiva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mandrakesoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nortel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sco group sco linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sco group sco unixware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sendmail consortium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xerox",
        "version": null
      },
      {
        "model": "bsd/os",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30d5\u30a9\u30a2 \u30c1\u30e5\u30fc\u30f3",
        "version": null
      },
      {
        "model": "ux4800\u30b7\u30ea\u30fc\u30ba",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u672c\u96fb\u6c17",
        "version": null
      },
      {
        "model": "sendmail",
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "sun cobalt qube3",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "systemwalker perfmgr",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "teamware office",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "sun cobalt raq3",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "sendmail switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bb\u30f3\u30c9\u30e1\u30fc\u30eb\u793e",
        "version": null
      },
      {
        "model": "up-ux",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u672c\u96fb\u6c17",
        "version": null
      },
      {
        "model": "sun cobalt raq4",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "interstage collaborationring pm",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "irix",
        "scope": null,
        "trust": 0.8,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": "netbsd",
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": "sun linux 5.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "turbolinux workstation",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9",
        "version": null
      },
      {
        "model": "unixware",
        "scope": null,
        "trust": 0.8,
        "vendor": "sco",
        "version": null
      },
      {
        "model": "interstage collaborationring tpm",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "sendmail pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bb\u30f3\u30c9\u30e1\u30fc\u30eb\u793e",
        "version": null
      },
      {
        "model": "sendmail for nt",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bb\u30f3\u30c9\u30e1\u30fc\u30eb\u793e",
        "version": null
      },
      {
        "model": "turbolinux advanced server",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9",
        "version": null
      },
      {
        "model": "systemwalker it budgetmgr",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "apple mac os x",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a2\u30c3\u30d7\u30eb",
        "version": null
      },
      {
        "model": "aix",
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "hi-ux/we2",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u7acb",
        "version": null
      },
      {
        "model": "open unix",
        "scope": null,
        "trust": 0.8,
        "vendor": "sco",
        "version": null
      },
      {
        "model": "trendmicro interscan viruswall",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30c8\u30ec\u30f3\u30c9\u30de\u30a4\u30af\u30ed",
        "version": null
      },
      {
        "model": "sun cobalt raq550",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "internet navigware server",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "openlinux",
        "scope": null,
        "trust": 0.8,
        "vendor": "sco",
        "version": null
      },
      {
        "model": "hp-ux",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9",
        "version": null
      },
      {
        "model": "interstage office square",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "red hat enterprise linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "sun solaris",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "red hat linux advanced workstation",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "turbolinux server",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9",
        "version": null
      },
      {
        "model": "sun cobalt raqxtr",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "red hat linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "ews-ux",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u672c\u96fb\u6c17",
        "version": null
      },
      {
        "model": "freebsd",
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "river systems platform sa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wind",
        "version": "1.0"
      },
      {
        "model": "river systems bsd/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wind",
        "version": "5.0"
      },
      {
        "model": "river systems bsd/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wind",
        "version": "4.3.1"
      },
      {
        "model": "river systems bsd/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wind",
        "version": "4.2"
      },
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "9"
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 7.0 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "solaris 2.6 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.6"
      },
      {
        "model": "lx50",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "cobalt raq xtr",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "550"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3"
      },
      {
        "model": "cobalt qube",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3"
      },
      {
        "model": "cobalt manageraq3 3000r-mr",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "cobalt cacheraq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5"
      },
      {
        "model": "freeware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "1.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "consortium sendmail beta7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "5.65"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "5.61"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "5.59"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "7.1.3"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "7.1.1"
      },
      {
        "model": "open unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "8.0"
      },
      {
        "model": "z/os v1r4",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "z/os v1r2",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "os/390 v2r8",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "os/390 v2r10",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "mvs",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "hp-ux b.11.22",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.11",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.04",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.00",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "linux rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "inc sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "gnu/*/linux",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "openwall",
        "version": "1.0"
      },
      {
        "model": "networks junos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5.1"
      },
      {
        "model": "networks junos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5.0"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ISS X-Force\u203b xforce@iss.net",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2002-1337",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2002-1337",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-5722",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2002-1337",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#398025",
            "trust": 0.8,
            "value": "66.00"
          },
          {
            "author": "NVD",
            "id": "CVE-2002-1337",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200303-038",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-5722",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. sendmail A buffer overflow vulnerability was discovered in message processing. The vulnerability could allow a third party to gain administrative privileges remotely. This problem, sendmail is caused by receiving a message with maliciously constructed header information. For this reason, LAN is running on a host installed within sendmail Even other MTA (Mail Transfer Agent) You may be affected by the vulnerability if you receive a malicious message relayed from .A third party may be able to remotely obtain administrator privileges. Sendmail is prone to a remotely buffer-overflow vulnerability in the SMTP header parsing component.  Successful attackers may exploit this vulnerability to gain control of affected servers. \nReportedly, this vulnerability may be locally exploitable if the sendmail binary is setuid/setgid. \nSendmail 5.2 to 8.12.7 are affected. Administrators are advised to upgrade to 8.12.8 or to apply patches to earlier versions of the 8.12.x tree. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\\\\% to 75\\\\% of the total. Many UNIX and Linux workstations run Sendmail by default. When an email header contains an address or address list (eg \\\"From\\\", \\\"To\\\", \\\"CC\\\"), Sendmail will attempt to check whether the provided address or address list is valid. Sendmail does this using the crackaddr() function, which is located in the headers.c file in the Sendmail source tree. Sendmail will check this buffer and stop adding data to it if it is found to be full. Sendmail goes through several safety checks to ensure that characters are interpreted correctly. On most Unix or Linux systems, Sendmail runs as the root user. Because the attack code can be included in what appears to be a normal email message, it can easily penetrate many common packet filtering devices or firewalls without being detected. Successful exploitation of an unpatched sendmail system leaves no messages in the syslog. However, on patched systems, attempts to exploit this vulnerability leave the following log message: Dropped invalid comments from header address This vulnerability affects both the commercial and open source versions of Sendmail, and is also reported to have been tested in the lab environment has been successfully exploited",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      },
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      }
    ],
    "trust": 2.7
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-5722",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2002-1337",
        "trust": 3.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#398025",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "6991",
        "trust": 2.8
      },
      {
        "db": "XF",
        "id": "10748",
        "trust": 1.4
      },
      {
        "db": "XF",
        "id": "11653",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038",
        "trust": 0.7
      },
      {
        "db": "CALDERA",
        "id": "CSSA-2003-SCO.5",
        "trust": 0.6
      },
      {
        "db": "CALDERA",
        "id": "CSSA-2003-SCO.6",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:074",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:073",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:227",
        "trust": 0.6
      },
      {
        "db": "HP",
        "id": "HPSBUX0302-246",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030303 FWD: APPLE-SA-2003-03-03 SENDMAIL",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030304 [LSD] TECHNICAL ANALYSIS OF THE REMOTE SENDMAIL VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030304 GLSA: SENDMAIL (200303-4)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030303 SENDMAIL 8.12.8 AVAILABLE",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2003-07",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:2222",
        "trust": 0.6
      },
      {
        "db": "AIXAPAR",
        "id": "IY40500",
        "trust": 0.6
      },
      {
        "db": "AIXAPAR",
        "id": "IY40502",
        "trust": 0.6
      },
      {
        "db": "AIXAPAR",
        "id": "IY40501",
        "trust": 0.6
      },
      {
        "db": "CONECTIVA",
        "id": "CLA-2003:571",
        "trust": 0.6
      },
      {
        "db": "MANDRAKE",
        "id": "MDKSA-2003:028",
        "trust": 0.6
      },
      {
        "db": "SGI",
        "id": "20030301-01-P",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-257",
        "trust": 0.6
      },
      {
        "db": "ISS",
        "id": "20030303 REMOTE SENDMAIL HEADER PROCESSING VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "NETBSD",
        "id": "NETBSD-SA2003-002",
        "trust": 0.6
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76118",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76119",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "22314",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "22313",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "411",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "id": "VAR-200303-0122",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      }
    ],
    "trust": 0.421969685
  },
  "last_update_date": "2025-04-03T20:39:21.067000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HS03-001 Fujitsu CERT\u00a0Advisory information",
        "trust": 0.8,
        "url": "http://www.debian.org/security/2003/dsa-257"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-120",
        "trust": 1.0
      },
      {
        "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "http://www.iss.net/issen/delivery/xforce/alertdetail.jsp?oid=21950"
      },
      {
        "trust": 2.8,
        "url": "http://www.sendmail.org/8.12.8.html"
      },
      {
        "trust": 2.8,
        "url": "http://www.cert.org/advisories/ca-2003-07.html"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/6991"
      },
      {
        "trust": 2.5,
        "url": "http://www.kb.cert.org/vuls/id/398025"
      },
      {
        "trust": 1.7,
        "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=iy40500\u0026apar=only"
      },
      {
        "trust": 1.7,
        "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=iy40501\u0026apar=only"
      },
      {
        "trust": 1.7,
        "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=iy40502\u0026apar=only"
      },
      {
        "trust": 1.7,
        "url": "ftp://ftp.sco.com/pub/updates/unixware/cssa-2003-sco.5"
      },
      {
        "trust": 1.7,
        "url": "ftp://ftp.sco.com/pub/updates/openserver/cssa-2003-sco.6"
      },
      {
        "trust": 1.7,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571"
      },
      {
        "trust": 1.7,
        "url": "http://www.debian.org/security/2003/dsa-257"
      },
      {
        "trust": 1.7,
        "url": "http://frontal2.mandriva.com/security/advisories?name=mdksa-2003:028"
      },
      {
        "trust": 1.7,
        "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2003-002.txt.asc"
      },
      {
        "trust": 1.7,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-073.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-074.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-227.html"
      },
      {
        "trust": 1.7,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-p"
      },
      {
        "trust": 1.7,
        "url": "http://www.iss.net/security_center/static/10748.php"
      },
      {
        "trust": 1.1,
        "url": "http://www.sendmail.org"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2222"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.com/security/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.org/archive/1/313757/2003-03-01/2003-03-07/0"
      },
      {
        "trust": 0.8,
        "url": "http://www.nipc.gov/warnings/advisories/2003/03-004.htm"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-07"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-1337"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/at/2003/at030002.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031001.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030314_190827.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030305_170302.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.ipa.go.jp/security/ciadr/20030303sendmail.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.ciac.org/ciac/bulletins/n-048.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://www.isskk.co.jp/support/techinfo/general/sendmailheader_xforce.html"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/10748"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/11653"
      },
      {
        "trust": 0.6,
        "url": "http://ftp.support.compaq.com/patches/public/readmes/unix/t64v51ab21-c0103500-17099-es-20030226.readme"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104679411316818\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104678862409849\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104678862109841\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104678739608479\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104673778105192\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2222"
      },
      {
        "trust": 0.3,
        "url": "http://www.info.apple.com/usen/security/security_updates.html"
      },
      {
        "trust": 0.3,
        "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/mss/mss-oar-e01-2003.0794.1"
      },
      {
        "trust": 0.3,
        "url": "http://www.slackware.org/lists/archive/viewer.php?l=slackware-security\u0026y=2003\u0026m=slackware-security.286398"
      },
      {
        "trust": 0.3,
        "url": "http://www.sendmail.org/"
      },
      {
        "trust": 0.3,
        "url": "ftp://ftp1.support.compaq.com/public/unix/v4.0g/t64v40gb17-c0028100-16887-es-20030211.readme"
      },
      {
        "trust": 0.3,
        "url": "ftp://ftp1.support.compaq.com/public/unix/v4.0f/duv40fb18-c0092200-16888-es-20030211.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp1.support.compaq.com/public/unix/v5.0a/t64v50ab17-c0031300-16884-es-20030211.readme"
      },
      {
        "trust": 0.3,
        "url": "ftp://ftp1.support.compaq.com/public/unix/v5.1/t64v51b19-c0169100-16882-es-20030211.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/readmes/unix/t64v51bb1-c0003900-16874-es-20030211.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/readmes/unix/t64v51b20-c0169800-16980-es-20030218.readme"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/51181"
      },
      {
        "trust": 0.3,
        "url": "http://www.sendmail.com"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/313757"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/313795"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/313841"
      },
      {
        "trust": 0.1,
        "url": ""
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-03-03T00:00:00",
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "date": "2003-03-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "date": "2003-03-02T00:00:00",
        "db": "BID",
        "id": "6991"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "date": "2003-03-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "date": "2003-03-07T05:00:00",
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-15T00:00:00",
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "date": "2007-09-22T00:30:00",
        "db": "BID",
        "id": "6991"
      },
      {
        "date": "2024-03-01T01:52:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "date": "2006-08-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Remote Buffer Overflow in Sendmail",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      }
    ],
    "trust": 0.9
  }
}

VAR-202107-1672

Vulnerability from variot - Updated: 2024-11-23 20:00

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer. F5 Networks of nginx Products from other vendors contain vulnerabilities related to certificate validation.Information may be obtained and information may be tampered with. (CVE-2020-11724). ========================================================================== Ubuntu Security Notice USN-5371-2 April 28, 2022

nginx vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 22.04 LTS

Summary:

nginx could be made to redirect network traffic.

Software Description: - nginx: small, powerful, scalable web/proxy server

Details:

USN-5371-1 fixed several vulnerabilities in nginx. This update provides the fix for CVE-2021-3618 for Ubuntu 22.04 LTS.

Original advisory details:

It was discovered that nginx Lua module mishandled certain inputs. An attacker could possibly use this issue to perform an HTTP Request Smuggling attack. This issue only affects Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-11724)

It was discovered that nginx Lua module mishandled certain inputs. An attacker could possibly use this issue to disclose sensitive information. This issue only affects Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-36309)

It was discovered that nginx mishandled the use of compatible certificates among multiple encryption protocols. (CVE-2021-3618)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 22.04 LTS: nginx-core 1.18.0-6ubuntu14.1 nginx-extras 1.18.0-6ubuntu14.1 nginx-light 1.18.0-6ubuntu14.1

In general, a standard system update will make all the necessary changes.

References: https://ubuntu.com/security/notices/USN-5371-2 https://ubuntu.com/security/notices/USN-5371-1 CVE-2021-3618

Package Information: https://launchpad.net/ubuntu/+source/nginx/1.18.0-6ubuntu14.1

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1672",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nginx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "f5",
        "version": "1.21.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "33"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "35"
      },
      {
        "model": "sendmail",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.17"
      },
      {
        "model": "vsftpd",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "vsftpd",
        "version": "3.0.4"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "34"
      },
      {
        "model": "vsftpd",
        "scope": null,
        "trust": 0.8,
        "vendor": "vsftpd",
        "version": null
      },
      {
        "model": "nginx",
        "scope": null,
        "trust": 0.8,
        "vendor": "f5",
        "version": null
      },
      {
        "model": "fedora",
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "sendmail",
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ubuntu",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      }
    ],
    "trust": 0.4
  },
  "cve": "CVE-2021-3618",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2021-3618",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-395783",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.2,
            "id": "CVE-2021-3618",
            "impactScore": 5.2,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.4,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2021-3618",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-3618",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-3618",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202107-216",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-395783",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-3618",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim\u0027s traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer. F5 Networks of nginx Products from other vendors contain vulnerabilities related to certificate validation.Information may be obtained and information may be tampered with. (CVE-2020-11724). ==========================================================================\nUbuntu Security Notice USN-5371-2\nApril 28, 2022\n\nnginx vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 22.04 LTS\n\nSummary:\n\nnginx could be made to redirect network traffic. \n\nSoftware Description:\n- nginx: small, powerful, scalable web/proxy server\n\nDetails:\n\nUSN-5371-1 fixed several vulnerabilities in nginx. \nThis update provides the fix for CVE-2021-3618 for Ubuntu 22.04 LTS. \n\nOriginal advisory details:\n\n  It was discovered that nginx Lua module mishandled certain inputs. \n  An attacker could possibly use this issue to perform an HTTP Request\n  Smuggling attack. This issue only affects Ubuntu 18.04 LTS and\n  Ubuntu 20.04 LTS. (CVE-2020-11724)\n\n  It was discovered that nginx Lua module mishandled certain inputs. \n  An attacker could possibly use this issue to disclose sensitive\n  information. This issue only affects Ubuntu 18.04 LTS and\n  Ubuntu 20.04 LTS. (CVE-2020-36309)\n\n  It was discovered that nginx mishandled the use of\n  compatible certificates among multiple encryption protocols. \n  (CVE-2021-3618)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 22.04 LTS:\n   nginx-core                      1.18.0-6ubuntu14.1\n   nginx-extras                    1.18.0-6ubuntu14.1\n   nginx-light                     1.18.0-6ubuntu14.1\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n   https://ubuntu.com/security/notices/USN-5371-2\n   https://ubuntu.com/security/notices/USN-5371-1\n   CVE-2021-3618\n\nPackage Information:\n   https://launchpad.net/ubuntu/+source/nginx/1.18.0-6ubuntu14.1\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-3618",
        "trust": 3.8
      },
      {
        "db": "PACKETSTORM",
        "id": "168672",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "166709",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "166888",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.6109",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.1628",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.6139",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022042817",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022010906",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022041422",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-395783",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "174729",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "id": "VAR-202107-1672",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T20:00:55.051000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top\u00a0Page",
        "trust": 0.8,
        "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
      },
      {
        "title": "nginx Security vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=155955"
      },
      {
        "title": "Ubuntu Security Notice: USN-5371-3: nginx vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5371-3"
      },
      {
        "title": "Debian CVElist Bug Report Logs: nginx: CVE-2021-3618",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=ef1074892d0995f0a511641c443018df"
      },
      {
        "title": "Ubuntu Security Notice: USN-5371-2: nginx vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5371-2"
      },
      {
        "title": "Ubuntu Security Notice: USN-5371-1: nginx vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5371-1"
      },
      {
        "title": "Amazon Linux 2: ALASNGINX1-2023-002",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALASNGINX1-2023-002"
      },
      {
        "title": "Red Hat: CVE-2021-3618",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2021-3618"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-3618 log"
      },
      {
        "title": "Amazon Linux 2022: ALAS2022-2022-172",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=ALAS2022-2022-172"
      },
      {
        "title": "Amazon Linux 2022: ALAS2022-2022-132",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=ALAS2022-2022-132"
      },
      {
        "title": "Amazon Linux 2022: ALAS2022-2022-171",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=ALAS2022-2022-171"
      },
      {
        "title": "Amazon Linux 2022: ALAS2022-2022-136",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=ALAS2022-2022-136"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/Live-Hack-CVE/CVE-2021-3618 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-295",
        "trust": 1.1
      },
      {
        "problemtype": "Illegal certificate verification (CWE-295) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "https://alpaca-attack.com/"
      },
      {
        "trust": 1.8,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
      },
      {
        "trust": 1.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3618"
      },
      {
        "trust": 0.6,
        "url": "https://ubuntu.com/security/cve-2021-3618"
      },
      {
        "trust": 0.6,
        "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991329"
      },
      {
        "trust": 0.6,
        "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991328"
      },
      {
        "trust": 0.6,
        "url": "https://github.com/nginx/nginx/commit/173f16f736c10eae46cd15dd861b04b82d91a37a"
      },
      {
        "trust": 0.6,
        "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991331"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022010906"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6489853"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022041422"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/nginx-man-in-the-middle-via-the-tls-extension-alpn-35818"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/168672/ubuntu-security-notice-usn-5371-3.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6514817"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2021-3618/"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022042817"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166709/ubuntu-security-notice-usn-5371-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.1628"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.6109"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166888/ubuntu-security-notice-usn-5371-2.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.6139"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36309"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11724"
      },
      {
        "trust": 0.3,
        "url": "https://ubuntu.com/security/notices/usn-5371-1"
      },
      {
        "trust": 0.2,
        "url": "https://ubuntu.com/security/notices/usn-5371-3"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/295.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/live-hack-cve/cve-2021-3618"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/nginx/1.18.0-0ubuntu1.3"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/nginx/1.18.0-6ubuntu11.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/nginx/1.14.0-0ubuntu1.10"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/nginx/1.18.0-6ubuntu14.1"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-5371-2"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-6379-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/vsftpd/3.0.5-0ubuntu0.20.04.1"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-03-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "date": "2022-03-23T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "date": "2023-08-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "date": "2022-04-13T15:03:13",
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "date": "2022-10-10T16:13:35",
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "date": "2022-04-28T15:18:16",
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "date": "2023-09-19T15:23:43",
        "db": "PACKETSTORM",
        "id": "174729"
      },
      {
        "date": "2021-07-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "date": "2022-03-23T20:15:09.833000",
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-02-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "date": "2023-02-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "date": "2023-08-10T07:42:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "date": "2023-05-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "date": "2024-11-21T06:21:59.713000",
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "F5\u00a0Networks\u00a0 of \u00a0nginx\u00a0 Vulnerability related to certificate verification in products of multiple vendors",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      }
    ],
    "trust": 0.6
  }
}

CVE-2023-51765 (GCVE-0-2023-51765)

Vulnerability from nvd – Published: 2023-12-24 00:00 – Updated: 2024-08-02 22:48
VLAI?
Summary
sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T22:48:11.197Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2023/12/22/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2023/12/21/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/freebsd/freebsd-src/commit/5dd76dd0cc19450133aa379ce0ce4a68ae07fb39#diff-afdf514b32ac88004952c11660c57bc96c3d8b2234007c1cbd8d7ed7fd7935cc"
          },
          {
            "name": "[oss-security] 20231224 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
          },
          {
            "name": "[oss-security] 20231225 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.suse.com/show_bug.cgi?id=1218351"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255869"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2023-51765"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
          },
          {
            "name": "[oss-security] 20231226 Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/26/5"
          },
          {
            "name": "[oss-security] 20231229 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/29/5"
          },
          {
            "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/30/3"
          },
          {
            "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/30/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lwn.net/Articles/956533/"
          },
          {
            "name": "[debian-lts-announce] 20240615 [SECURITY] [DLA 3829-1] sendmail security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports \u003cLF\u003e.\u003cCR\u003e\u003cLF\u003e but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with \u0027o\u0027 in srv_features."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-15T09:05:58.617529",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2023/12/22/7"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2023/12/21/7"
        },
        {
          "url": "https://github.com/freebsd/freebsd-src/commit/5dd76dd0cc19450133aa379ce0ce4a68ae07fb39#diff-afdf514b32ac88004952c11660c57bc96c3d8b2234007c1cbd8d7ed7fd7935cc"
        },
        {
          "name": "[oss-security] 20231224 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
        },
        {
          "name": "[oss-security] 20231225 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
        },
        {
          "url": "https://bugzilla.suse.com/show_bug.cgi?id=1218351"
        },
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255869"
        },
        {
          "url": "https://access.redhat.com/security/cve/CVE-2023-51765"
        },
        {
          "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
        },
        {
          "name": "[oss-security] 20231226 Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/26/5"
        },
        {
          "name": "[oss-security] 20231229 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/29/5"
        },
        {
          "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/30/3"
        },
        {
          "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/30/1"
        },
        {
          "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
        },
        {
          "url": "https://lwn.net/Articles/956533/"
        },
        {
          "name": "[debian-lts-announce] 20240615 [SECURITY] [DLA 3829-1] sendmail security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-51765",
    "datePublished": "2023-12-24T00:00:00",
    "dateReserved": "2023-12-24T00:00:00",
    "dateUpdated": "2024-08-02T22:48:11.197Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3618 (GCVE-0-2021-3618)

Vulnerability from nvd – Published: 2022-03-23 00:00 – Updated: 2024-08-03 17:01
VLAI?
Summary
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
n/a ALPACA Affected: vsftpd 3.0.4, nginx 1.21.0, sendmail 8.17
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:01:07.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://alpaca-attack.com/"
          },
          {
            "name": "[debian-lts-announce] 20221122 [SECURITY] [DLA 3203-1] nginx security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ALPACA",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "vsftpd 3.0.4, nginx 1.21.0, sendmail 8.17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim\u0027s traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-23T00:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623"
        },
        {
          "url": "https://alpaca-attack.com/"
        },
        {
          "name": "[debian-lts-announce] 20221122 [SECURITY] [DLA 3203-1] nginx security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2021-3618",
    "datePublished": "2022-03-23T00:00:00",
    "dateReserved": "2021-06-24T00:00:00",
    "dateUpdated": "2024-08-03T17:01:07.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3956 (GCVE-0-2014-3956)

Vulnerability from nvd – Published: 2014-06-04 10:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:18.265Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
          },
          {
            "name": "58628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/58628"
          },
          {
            "name": "FreeBSD-SA-14:11",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
          },
          {
            "name": "MDVSA-2015:128",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
          },
          {
            "name": "GLSA-201412-32",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
          },
          {
            "name": "openSUSE-SU-2014:0804",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
          },
          {
            "name": "MDVSA-2014:147",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
          },
          {
            "name": "FEDORA-2014-7093",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
          },
          {
            "name": "openSUSE-SU-2014:0805",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
          },
          {
            "name": "57455",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57455"
          },
          {
            "name": "67791",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/67791"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
          },
          {
            "name": "SSA:2014-156-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
          },
          {
            "name": "1030331",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1030331"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-28T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
        },
        {
          "name": "58628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/58628"
        },
        {
          "name": "FreeBSD-SA-14:11",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
        },
        {
          "name": "MDVSA-2015:128",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
        },
        {
          "name": "GLSA-201412-32",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
        },
        {
          "name": "openSUSE-SU-2014:0804",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
        },
        {
          "name": "MDVSA-2014:147",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
        },
        {
          "name": "FEDORA-2014-7093",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
        },
        {
          "name": "openSUSE-SU-2014:0805",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
        },
        {
          "name": "57455",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57455"
        },
        {
          "name": "67791",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/67791"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
        },
        {
          "name": "SSA:2014-156-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
        },
        {
          "name": "1030331",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1030331"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-3956",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
            },
            {
              "name": "58628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/58628"
            },
            {
              "name": "FreeBSD-SA-14:11",
              "refsource": "FREEBSD",
              "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
            },
            {
              "name": "MDVSA-2015:128",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
            },
            {
              "name": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
            },
            {
              "name": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
            },
            {
              "name": "GLSA-201412-32",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
            },
            {
              "name": "http://www.sendmail.com/sm/open_source/download/8.14.9/",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
            },
            {
              "name": "openSUSE-SU-2014:0804",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
            },
            {
              "name": "MDVSA-2014:147",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
            },
            {
              "name": "FEDORA-2014-7093",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
            },
            {
              "name": "openSUSE-SU-2014:0805",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
            },
            {
              "name": "57455",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/57455"
            },
            {
              "name": "67791",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/67791"
            },
            {
              "name": "http://advisories.mageia.org/MGASA-2014-0270.html",
              "refsource": "CONFIRM",
              "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
            },
            {
              "name": "SSA:2014-156-04",
              "refsource": "SLACKWARE",
              "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
            },
            {
              "name": "1030331",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1030331"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-3956",
    "datePublished": "2014-06-04T10:00:00",
    "dateReserved": "2014-06-03T00:00:00",
    "dateUpdated": "2024-08-06T10:57:18.265Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4565 (GCVE-0-2009-4565)

Vulnerability from nvd – Published: 2010-01-04 21:00 – Updated: 2024-08-07 07:08
VLAI?
Summary
sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/38314 third-party-advisoryx_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201206-30.xml vendor-advisoryx_refsource_GENTOO
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/39088 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3661 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/37998 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/37543 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2011/0415 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/43366 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.sendmail.org/releases/8.14.4 x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=126953289726317&w=2 vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2010/0719 vdb-entryx_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2011-02… vendor-advisoryx_refsource_REDHAT
http://www.debian.org/security/2010/dsa-1985 vendor-advisoryx_refsource_DEBIAN
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://marc.info/?l=bugtraq&m=126953289726317&w=2 vendor-advisoryx_refsource_HP
http://secunia.com/advisories/40109 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/38915 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/1386 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:08:38.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "38314",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38314"
          },
          {
            "name": "GLSA-201206-30",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
          },
          {
            "name": "1021797",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
          },
          {
            "name": "39088",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39088"
          },
          {
            "name": "ADV-2009-3661",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3661"
          },
          {
            "name": "37998",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37998"
          },
          {
            "name": "37543",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37543"
          },
          {
            "name": "ADV-2011-0415",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0415"
          },
          {
            "name": "43366",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43366"
          },
          {
            "name": "SUSE-SR:2010:006",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
          },
          {
            "name": "oval:org.mitre.oval:def:10255",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.14.4"
          },
          {
            "name": "HPSBUX02508",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
          },
          {
            "name": "ADV-2010-0719",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0719"
          },
          {
            "name": "RHSA-2011:0262",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
          },
          {
            "name": "DSA-1985",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-1985"
          },
          {
            "name": "oval:org.mitre.oval:def:11822",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
          },
          {
            "name": "SSRT100007",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
          },
          {
            "name": "40109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40109"
          },
          {
            "name": "38915",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38915"
          },
          {
            "name": "ADV-2010-1386",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1386"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "sendmail before 8.14.4 does not properly handle a \u0027\\0\u0027 character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "38314",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38314"
        },
        {
          "name": "GLSA-201206-30",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
        },
        {
          "name": "1021797",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
        },
        {
          "name": "39088",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39088"
        },
        {
          "name": "ADV-2009-3661",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3661"
        },
        {
          "name": "37998",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37998"
        },
        {
          "name": "37543",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37543"
        },
        {
          "name": "ADV-2011-0415",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0415"
        },
        {
          "name": "43366",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43366"
        },
        {
          "name": "SUSE-SR:2010:006",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
        },
        {
          "name": "oval:org.mitre.oval:def:10255",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.14.4"
        },
        {
          "name": "HPSBUX02508",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
        },
        {
          "name": "ADV-2010-0719",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0719"
        },
        {
          "name": "RHSA-2011:0262",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
        },
        {
          "name": "DSA-1985",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-1985"
        },
        {
          "name": "oval:org.mitre.oval:def:11822",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
        },
        {
          "name": "SSRT100007",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
        },
        {
          "name": "40109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40109"
        },
        {
          "name": "38915",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38915"
        },
        {
          "name": "ADV-2010-1386",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1386"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4565",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "sendmail before 8.14.4 does not properly handle a \u0027\\0\u0027 character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "38314",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38314"
            },
            {
              "name": "GLSA-201206-30",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
            },
            {
              "name": "1021797",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
            },
            {
              "name": "39088",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39088"
            },
            {
              "name": "ADV-2009-3661",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3661"
            },
            {
              "name": "37998",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37998"
            },
            {
              "name": "37543",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37543"
            },
            {
              "name": "ADV-2011-0415",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0415"
            },
            {
              "name": "43366",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43366"
            },
            {
              "name": "SUSE-SR:2010:006",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
            },
            {
              "name": "oval:org.mitre.oval:def:10255",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
            },
            {
              "name": "http://www.sendmail.org/releases/8.14.4",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.14.4"
            },
            {
              "name": "HPSBUX02508",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
            },
            {
              "name": "ADV-2010-0719",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0719"
            },
            {
              "name": "RHSA-2011:0262",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
            },
            {
              "name": "DSA-1985",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2010/dsa-1985"
            },
            {
              "name": "oval:org.mitre.oval:def:11822",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
            },
            {
              "name": "SSRT100007",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
            },
            {
              "name": "40109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40109"
            },
            {
              "name": "38915",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38915"
            },
            {
              "name": "ADV-2010-1386",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/1386"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4565",
    "datePublished": "2010-01-04T21:00:00",
    "dateReserved": "2010-01-04T00:00:00",
    "dateUpdated": "2024-08-07T07:08:38.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1490 (GCVE-0-2009-1490)

Vulnerability from nvd – Published: 2009-05-05 19:00 – Updated: 2024-08-07 05:13
VLAI?
Summary
Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.560Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.13.2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
          },
          {
            "name": "sendmail-xheader-bo(50355)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.13.2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
        },
        {
          "name": "sendmail-xheader-bo(50355)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1490",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sendmail.org/releases/8.13.2",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.13.2"
            },
            {
              "name": "http://www.nmrc.org/~thegnome/blog/apr09/",
              "refsource": "MISC",
              "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
            },
            {
              "name": "sendmail-xheader-bo(50355)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1490",
    "datePublished": "2009-05-05T19:00:00",
    "dateReserved": "2009-04-30T00:00:00",
    "dateUpdated": "2024-08-07T05:13:25.560Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-2246 (GCVE-0-2007-2246)

Vulnerability from nvd – Published: 2007-04-25 16:00 – Updated: 2024-08-07 13:33
VLAI?
Summary
Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors. NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1017966 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/23606 vdb-entryx_refsource_BID
http://www.kb.cert.org/vuls/id/349305 third-party-advisoryx_refsource_CERT-VN
http://secunia.com/advisories/24990 third-party-advisoryx_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2007/1504 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:33:28.308Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1017966",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017966"
          },
          {
            "name": "23606",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23606"
          },
          {
            "name": "VU#349305",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/349305"
          },
          {
            "name": "24990",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24990"
          },
          {
            "name": "SSRT061243",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
          },
          {
            "name": "HPSBUX02183",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
          },
          {
            "name": "ADV-2007-1504",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1504"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors.  NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-05-02T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1017966",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017966"
        },
        {
          "name": "23606",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23606"
        },
        {
          "name": "VU#349305",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/349305"
        },
        {
          "name": "24990",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24990"
        },
        {
          "name": "SSRT061243",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
        },
        {
          "name": "HPSBUX02183",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
        },
        {
          "name": "ADV-2007-1504",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1504"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2246",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors.  NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1017966",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017966"
            },
            {
              "name": "23606",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23606"
            },
            {
              "name": "VU#349305",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/349305"
            },
            {
              "name": "24990",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24990"
            },
            {
              "name": "SSRT061243",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
            },
            {
              "name": "HPSBUX02183",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
            },
            {
              "name": "ADV-2007-1504",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1504"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2246",
    "datePublished": "2007-04-25T16:00:00",
    "dateReserved": "2007-04-25T00:00:00",
    "dateUpdated": "2024-08-07T13:33:28.308Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-7176 (GCVE-0-2006-7176)

Vulnerability from nvd – Published: 2007-03-27 23:00 – Updated: 2024-08-07 20:57
VLAI?
Summary
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the "localhost.localdomain" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/25098 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/bugzilla/show_bug.cgi… x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2007-02… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/25743 third-party-advisoryx_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.securityfocus.com/bid/23742 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:39.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "25098",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25098"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
          },
          {
            "name": "RHSA-2007:0252",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
          },
          {
            "name": "25743",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25743"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
          },
          {
            "name": "oval:org.mitre.oval:def:11499",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
          },
          {
            "name": "23742",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23742"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the \"localhost.localdomain\" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "25098",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25098"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
        },
        {
          "name": "RHSA-2007:0252",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
        },
        {
          "name": "25743",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25743"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
        },
        {
          "name": "oval:org.mitre.oval:def:11499",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
        },
        {
          "name": "23742",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23742"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-7176",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the \"localhost.localdomain\" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "25098",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25098"
            },
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
            },
            {
              "name": "RHSA-2007:0252",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
            },
            {
              "name": "25743",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25743"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
            },
            {
              "name": "oval:org.mitre.oval:def:11499",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
            },
            {
              "name": "23742",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23742"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-7176",
    "datePublished": "2007-03-27T23:00:00",
    "dateReserved": "2007-03-27T00:00:00",
    "dateUpdated": "2024-08-07T20:57:39.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-7175 (GCVE-0-2006-7175)

Vulnerability from nvd – Published: 2007-03-27 23:00 – Updated: 2024-08-07 20:57
VLAI?
Summary
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:39.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-10-03T16:21:25",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-7175",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-7175",
    "datePublished": "2007-03-27T23:00:00",
    "dateReserved": "2007-03-27T00:00:00",
    "dateUpdated": "2024-08-07T20:57:39.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4434 (GCVE-0-2006-4434)

Vulnerability from nvd – Published: 2006-08-29 00:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.openbsd.org/errata.html#sendmail3 vendor-advisoryx_refsource_OPENBSD
http://www.attrition.org/pipermail/vim/2006-Augus… mailing-listx_refsource_VIM
http://securitytracker.com/id?1016753 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/21637 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3994 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/28193 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/21749 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/21700 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1164 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/21641 third-party-advisoryx_refsource_SECUNIA
http://www.sendmail.org/releases/8.13.8.html x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/3393 vdb-entryx_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/bid/19714 vdb-entryx_refsource_BID
http://www.novell.com/linux/security/advisories/2… vendor-advisoryx_refsource_SUSE
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/22369 third-party-advisoryx_refsource_SECUNIA
http://www.openbsd.org/errata38.html#sendmail3 vendor-advisoryx_refsource_OPENBSD
http://secunia.com/advisories/21696 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:07.644Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata.html#sendmail3"
          },
          {
            "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
            "tags": [
              "mailing-list",
              "x_refsource_VIM",
              "x_transferred"
            ],
            "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
          },
          {
            "name": "1016753",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016753"
          },
          {
            "name": "21637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21637"
          },
          {
            "name": "ADV-2006-3994",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3994"
          },
          {
            "name": "28193",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/28193"
          },
          {
            "name": "21749",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21749"
          },
          {
            "name": "21700",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21700"
          },
          {
            "name": "DSA-1164",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1164"
          },
          {
            "name": "21641",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21641"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.13.8.html"
          },
          {
            "name": "ADV-2006-3393",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3393"
          },
          {
            "name": "MDKSA-2006:156",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
          },
          {
            "name": "19714",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19714"
          },
          {
            "name": "SUSE-SR:2006:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
          },
          {
            "name": "102664",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
          },
          {
            "name": "22369",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22369"
          },
          {
            "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata38.html#sendmail3"
          },
          {
            "name": "21696",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21696"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long \"header line\", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying \"The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-09-02T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata.html#sendmail3"
        },
        {
          "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
          "tags": [
            "mailing-list",
            "x_refsource_VIM"
          ],
          "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
        },
        {
          "name": "1016753",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016753"
        },
        {
          "name": "21637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21637"
        },
        {
          "name": "ADV-2006-3994",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3994"
        },
        {
          "name": "28193",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/28193"
        },
        {
          "name": "21749",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21749"
        },
        {
          "name": "21700",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21700"
        },
        {
          "name": "DSA-1164",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1164"
        },
        {
          "name": "21641",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21641"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.13.8.html"
        },
        {
          "name": "ADV-2006-3393",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3393"
        },
        {
          "name": "MDKSA-2006:156",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
        },
        {
          "name": "19714",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19714"
        },
        {
          "name": "SUSE-SR:2006:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
        },
        {
          "name": "102664",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
        },
        {
          "name": "22369",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22369"
        },
        {
          "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata38.html#sendmail3"
        },
        {
          "name": "21696",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21696"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4434",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long \"header line\", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying \"The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata.html#sendmail3"
            },
            {
              "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
              "refsource": "VIM",
              "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
            },
            {
              "name": "1016753",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016753"
            },
            {
              "name": "21637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21637"
            },
            {
              "name": "ADV-2006-3994",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3994"
            },
            {
              "name": "28193",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/28193"
            },
            {
              "name": "21749",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21749"
            },
            {
              "name": "21700",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21700"
            },
            {
              "name": "DSA-1164",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1164"
            },
            {
              "name": "21641",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21641"
            },
            {
              "name": "http://www.sendmail.org/releases/8.13.8.html",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.13.8.html"
            },
            {
              "name": "ADV-2006-3393",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3393"
            },
            {
              "name": "MDKSA-2006:156",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
            },
            {
              "name": "19714",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19714"
            },
            {
              "name": "SUSE-SR:2006:021",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
            },
            {
              "name": "102664",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
            },
            {
              "name": "22369",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22369"
            },
            {
              "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata38.html#sendmail3"
            },
            {
              "name": "21696",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21696"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4434",
    "datePublished": "2006-08-29T00:00:00",
    "dateReserved": "2006-08-28T00:00:00",
    "dateUpdated": "2024-08-07T19:06:07.644Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1173 (GCVE-0-2006-1173)

Vulnerability from nvd – Published: 2006-06-07 23:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www-1.ibm.com/support/search.wss?rs=0&q=IY… vendor-advisoryx_refsource_AIXAPAR
http://itrc.hp.com/service/cki/docDisplay.do?docI… vendor-advisoryx_refsource_HP
http://www.debian.org/security/2006/dsa-1155 vendor-advisoryx_refsource_DEBIAN
http://www.openbsd.org/errata38.html#sendmail2 vendor-advisoryx_refsource_OPENBSD
http://secunia.com/advisories/20684 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/442939/100… vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2006/2388 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/20726 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.vupen.com/english/advisories/2006/2351 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/21327 third-party-advisoryx_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-05… vendor-advisoryx_refsource_REDHAT
http://www.vupen.com/english/advisories/2006/2389 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/21647 third-party-advisoryx_refsource_SECUNIA
http://www.fortinet.com/FortiGuardCenter/advisory… x_refsource_CONFIRM
https://issues.rpath.com/browse/RPL-526 x_refsource_CONFIRM
http://secunia.com/advisories/20651 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20683 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20650 third-party-advisoryx_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://secunia.com/advisories/20782 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3135 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1016295 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/20694 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20473 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/2189 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/440744/100… mailing-listx_refsource_BUGTRAQ
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.vupen.com/english/advisories/2006/2798 vdb-entryx_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://www.sendmail.com/security/advisories/SA-20… x_refsource_CONFIRM
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/20673 third-party-advisoryx_refsource_SECUNIA
http://www.f-secure.com/security/fsc-2006-5.shtml x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/438241/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/21612 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20654 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/2390 vdb-entryx_refsource_VUPEN
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.gentoo.org/security/en/glsa/glsa-20060… vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/18433 vdb-entryx_refsource_BID
http://secunia.com/advisories/20675 third-party-advisoryx_refsource_SECUNIA
http://lists.suse.com/archive/suse-security-annou… vendor-advisoryx_refsource_SUSE
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories… vendor-advisoryx_refsource_FREEBSD
http://www.securityfocus.com/archive/1/437928/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/442939/100… vendor-advisoryx_refsource_HP
http://www.kb.cert.org/vuls/id/146718 third-party-advisoryx_refsource_CERT-VN
http://itrc.hp.com/service/cki/docDisplay.do?docI… vendor-advisoryx_refsource_HP
http://secunia.com/advisories/15779 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20641 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20679 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/26197 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/21042 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/21160 third-party-advisoryx_refsource_SECUNIA
http://www-1.ibm.com/support/search.wss?rs=0&q=IY… vendor-advisoryx_refsource_AIXAPAR
http://www.securityfocus.com/archive/1/438330/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IY85415",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
          },
          {
            "name": "HPSBTU02116",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
          },
          {
            "name": "DSA-1155",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1155"
          },
          {
            "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata38.html#sendmail2"
          },
          {
            "name": "20684",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20684"
          },
          {
            "name": "HPSBUX02124",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
          },
          {
            "name": "ADV-2006-2388",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2388"
          },
          {
            "name": "20726",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20726"
          },
          {
            "name": "oval:org.mitre.oval:def:11253",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
          },
          {
            "name": "ADV-2006-2351",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2351"
          },
          {
            "name": "21327",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21327"
          },
          {
            "name": "RHSA-2006:0515",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
          },
          {
            "name": "ADV-2006-2389",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2389"
          },
          {
            "name": "21647",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21647"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-526"
          },
          {
            "name": "20651",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20651"
          },
          {
            "name": "20683",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20683"
          },
          {
            "name": "20650",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20650"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
          },
          {
            "name": "20782",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20782"
          },
          {
            "name": "ADV-2006-3135",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3135"
          },
          {
            "name": "1016295",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016295"
          },
          {
            "name": "20694",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20694"
          },
          {
            "name": "20473",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20473"
          },
          {
            "name": "ADV-2006-2189",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2189"
          },
          {
            "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
          },
          {
            "name": "20060601-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
          },
          {
            "name": "ADV-2006-2798",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2798"
          },
          {
            "name": "102460",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
          },
          {
            "name": "20060602-01-U",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
          },
          {
            "name": "MDKSA-2006:104",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
          },
          {
            "name": "sendmail-multipart-mime-dos(27128)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
          },
          {
            "name": "20673",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20673"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
          },
          {
            "name": "20060621 Re: Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
          },
          {
            "name": "21612",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21612"
          },
          {
            "name": "20654",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20654"
          },
          {
            "name": "ADV-2006-2390",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2390"
          },
          {
            "name": "SSA:2006-166-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
          },
          {
            "name": "GLSA-200606-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
          },
          {
            "name": "18433",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18433"
          },
          {
            "name": "20675",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20675"
          },
          {
            "name": "SUSE-SA:2006:032",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
          },
          {
            "name": "FreeBSD-SA-06:17.sendmail",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
          },
          {
            "name": "20060620 Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
          },
          {
            "name": "SSRT061159",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
          },
          {
            "name": "VU#146718",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/146718"
          },
          {
            "name": "SSRT061135",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
          },
          {
            "name": "15779",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15779"
          },
          {
            "name": "20641",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20641"
          },
          {
            "name": "20679",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20679"
          },
          {
            "name": "26197",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/26197"
          },
          {
            "name": "21042",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21042"
          },
          {
            "name": "21160",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21160"
          },
          {
            "name": "IY85930",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
          },
          {
            "name": "20060624 Re: Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "IY85415",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
        },
        {
          "name": "HPSBTU02116",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
        },
        {
          "name": "DSA-1155",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1155"
        },
        {
          "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata38.html#sendmail2"
        },
        {
          "name": "20684",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20684"
        },
        {
          "name": "HPSBUX02124",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
        },
        {
          "name": "ADV-2006-2388",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2388"
        },
        {
          "name": "20726",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20726"
        },
        {
          "name": "oval:org.mitre.oval:def:11253",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
        },
        {
          "name": "ADV-2006-2351",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2351"
        },
        {
          "name": "21327",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21327"
        },
        {
          "name": "RHSA-2006:0515",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
        },
        {
          "name": "ADV-2006-2389",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2389"
        },
        {
          "name": "21647",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21647"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-526"
        },
        {
          "name": "20651",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20651"
        },
        {
          "name": "20683",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20683"
        },
        {
          "name": "20650",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20650"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
        },
        {
          "name": "20782",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20782"
        },
        {
          "name": "ADV-2006-3135",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3135"
        },
        {
          "name": "1016295",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016295"
        },
        {
          "name": "20694",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20694"
        },
        {
          "name": "20473",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20473"
        },
        {
          "name": "ADV-2006-2189",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2189"
        },
        {
          "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
        },
        {
          "name": "20060601-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
        },
        {
          "name": "ADV-2006-2798",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2798"
        },
        {
          "name": "102460",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
        },
        {
          "name": "20060602-01-U",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
        },
        {
          "name": "MDKSA-2006:104",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
        },
        {
          "name": "sendmail-multipart-mime-dos(27128)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
        },
        {
          "name": "20673",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20673"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
        },
        {
          "name": "20060621 Re: Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
        },
        {
          "name": "21612",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21612"
        },
        {
          "name": "20654",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20654"
        },
        {
          "name": "ADV-2006-2390",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2390"
        },
        {
          "name": "SSA:2006-166-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
        },
        {
          "name": "GLSA-200606-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
        },
        {
          "name": "18433",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18433"
        },
        {
          "name": "20675",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20675"
        },
        {
          "name": "SUSE-SA:2006:032",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
        },
        {
          "name": "FreeBSD-SA-06:17.sendmail",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
        },
        {
          "name": "20060620 Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
        },
        {
          "name": "SSRT061159",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
        },
        {
          "name": "VU#146718",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/146718"
        },
        {
          "name": "SSRT061135",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
        },
        {
          "name": "15779",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15779"
        },
        {
          "name": "20641",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20641"
        },
        {
          "name": "20679",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20679"
        },
        {
          "name": "26197",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/26197"
        },
        {
          "name": "21042",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21042"
        },
        {
          "name": "21160",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21160"
        },
        {
          "name": "IY85930",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
        },
        {
          "name": "20060624 Re: Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2006-1173",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IY85415",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
            },
            {
              "name": "HPSBTU02116",
              "refsource": "HP",
              "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
            },
            {
              "name": "DSA-1155",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1155"
            },
            {
              "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata38.html#sendmail2"
            },
            {
              "name": "20684",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20684"
            },
            {
              "name": "HPSBUX02124",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
            },
            {
              "name": "ADV-2006-2388",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2388"
            },
            {
              "name": "20726",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20726"
            },
            {
              "name": "oval:org.mitre.oval:def:11253",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
            },
            {
              "name": "ADV-2006-2351",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2351"
            },
            {
              "name": "21327",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21327"
            },
            {
              "name": "RHSA-2006:0515",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
            },
            {
              "name": "ADV-2006-2389",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2389"
            },
            {
              "name": "21647",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21647"
            },
            {
              "name": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html",
              "refsource": "CONFIRM",
              "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-526",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-526"
            },
            {
              "name": "20651",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20651"
            },
            {
              "name": "20683",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20683"
            },
            {
              "name": "20650",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20650"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
            },
            {
              "name": "20782",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20782"
            },
            {
              "name": "ADV-2006-3135",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3135"
            },
            {
              "name": "1016295",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016295"
            },
            {
              "name": "20694",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20694"
            },
            {
              "name": "20473",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20473"
            },
            {
              "name": "ADV-2006-2189",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2189"
            },
            {
              "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
            },
            {
              "name": "20060601-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
            },
            {
              "name": "ADV-2006-2798",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2798"
            },
            {
              "name": "102460",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
            },
            {
              "name": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
            },
            {
              "name": "20060602-01-U",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
            },
            {
              "name": "MDKSA-2006:104",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
            },
            {
              "name": "sendmail-multipart-mime-dos(27128)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
            },
            {
              "name": "20673",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20673"
            },
            {
              "name": "http://www.f-secure.com/security/fsc-2006-5.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
            },
            {
              "name": "20060621 Re: Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
            },
            {
              "name": "21612",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21612"
            },
            {
              "name": "20654",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20654"
            },
            {
              "name": "ADV-2006-2390",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2390"
            },
            {
              "name": "SSA:2006-166-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
            },
            {
              "name": "GLSA-200606-19",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
            },
            {
              "name": "18433",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18433"
            },
            {
              "name": "20675",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20675"
            },
            {
              "name": "SUSE-SA:2006:032",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
            },
            {
              "name": "FreeBSD-SA-06:17.sendmail",
              "refsource": "FREEBSD",
              "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
            },
            {
              "name": "20060620 Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
            },
            {
              "name": "SSRT061159",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
            },
            {
              "name": "VU#146718",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/146718"
            },
            {
              "name": "SSRT061135",
              "refsource": "HP",
              "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
            },
            {
              "name": "15779",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15779"
            },
            {
              "name": "20641",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20641"
            },
            {
              "name": "20679",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20679"
            },
            {
              "name": "26197",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/26197"
            },
            {
              "name": "21042",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21042"
            },
            {
              "name": "21160",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21160"
            },
            {
              "name": "IY85930",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
            },
            {
              "name": "20060624 Re: Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2006-1173",
    "datePublished": "2006-06-07T23:00:00",
    "dateReserved": "2006-03-12T00:00:00",
    "dateUpdated": "2024-08-07T17:03:28.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-51765 (GCVE-0-2023-51765)

Vulnerability from cvelistv5 – Published: 2023-12-24 00:00 – Updated: 2024-08-02 22:48
VLAI?
Summary
sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T22:48:11.197Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2023/12/22/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2023/12/21/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/freebsd/freebsd-src/commit/5dd76dd0cc19450133aa379ce0ce4a68ae07fb39#diff-afdf514b32ac88004952c11660c57bc96c3d8b2234007c1cbd8d7ed7fd7935cc"
          },
          {
            "name": "[oss-security] 20231224 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
          },
          {
            "name": "[oss-security] 20231225 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.suse.com/show_bug.cgi?id=1218351"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255869"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2023-51765"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
          },
          {
            "name": "[oss-security] 20231226 Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/26/5"
          },
          {
            "name": "[oss-security] 20231229 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/29/5"
          },
          {
            "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/30/3"
          },
          {
            "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/30/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lwn.net/Articles/956533/"
          },
          {
            "name": "[debian-lts-announce] 20240615 [SECURITY] [DLA 3829-1] sendmail security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports \u003cLF\u003e.\u003cCR\u003e\u003cLF\u003e but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with \u0027o\u0027 in srv_features."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-15T09:05:58.617529",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2023/12/22/7"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2023/12/21/7"
        },
        {
          "url": "https://github.com/freebsd/freebsd-src/commit/5dd76dd0cc19450133aa379ce0ce4a68ae07fb39#diff-afdf514b32ac88004952c11660c57bc96c3d8b2234007c1cbd8d7ed7fd7935cc"
        },
        {
          "name": "[oss-security] 20231224 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
        },
        {
          "name": "[oss-security] 20231225 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
        },
        {
          "url": "https://bugzilla.suse.com/show_bug.cgi?id=1218351"
        },
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255869"
        },
        {
          "url": "https://access.redhat.com/security/cve/CVE-2023-51765"
        },
        {
          "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
        },
        {
          "name": "[oss-security] 20231226 Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/26/5"
        },
        {
          "name": "[oss-security] 20231229 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/29/5"
        },
        {
          "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/30/3"
        },
        {
          "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/30/1"
        },
        {
          "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
        },
        {
          "url": "https://lwn.net/Articles/956533/"
        },
        {
          "name": "[debian-lts-announce] 20240615 [SECURITY] [DLA 3829-1] sendmail security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-51765",
    "datePublished": "2023-12-24T00:00:00",
    "dateReserved": "2023-12-24T00:00:00",
    "dateUpdated": "2024-08-02T22:48:11.197Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3618 (GCVE-0-2021-3618)

Vulnerability from cvelistv5 – Published: 2022-03-23 00:00 – Updated: 2024-08-03 17:01
VLAI?
Summary
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
n/a ALPACA Affected: vsftpd 3.0.4, nginx 1.21.0, sendmail 8.17
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:01:07.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://alpaca-attack.com/"
          },
          {
            "name": "[debian-lts-announce] 20221122 [SECURITY] [DLA 3203-1] nginx security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ALPACA",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "vsftpd 3.0.4, nginx 1.21.0, sendmail 8.17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim\u0027s traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-23T00:00:00",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623"
        },
        {
          "url": "https://alpaca-attack.com/"
        },
        {
          "name": "[debian-lts-announce] 20221122 [SECURITY] [DLA 3203-1] nginx security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2021-3618",
    "datePublished": "2022-03-23T00:00:00",
    "dateReserved": "2021-06-24T00:00:00",
    "dateUpdated": "2024-08-03T17:01:07.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3956 (GCVE-0-2014-3956)

Vulnerability from cvelistv5 – Published: 2014-06-04 10:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:18.265Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
          },
          {
            "name": "58628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/58628"
          },
          {
            "name": "FreeBSD-SA-14:11",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
          },
          {
            "name": "MDVSA-2015:128",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
          },
          {
            "name": "GLSA-201412-32",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
          },
          {
            "name": "openSUSE-SU-2014:0804",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
          },
          {
            "name": "MDVSA-2014:147",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
          },
          {
            "name": "FEDORA-2014-7093",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
          },
          {
            "name": "openSUSE-SU-2014:0805",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
          },
          {
            "name": "57455",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57455"
          },
          {
            "name": "67791",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/67791"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
          },
          {
            "name": "SSA:2014-156-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
          },
          {
            "name": "1030331",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1030331"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-28T19:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
        },
        {
          "name": "58628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/58628"
        },
        {
          "name": "FreeBSD-SA-14:11",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
        },
        {
          "name": "MDVSA-2015:128",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
        },
        {
          "name": "GLSA-201412-32",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
        },
        {
          "name": "openSUSE-SU-2014:0804",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
        },
        {
          "name": "MDVSA-2014:147",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
        },
        {
          "name": "FEDORA-2014-7093",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
        },
        {
          "name": "openSUSE-SU-2014:0805",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
        },
        {
          "name": "57455",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57455"
        },
        {
          "name": "67791",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/67791"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
        },
        {
          "name": "SSA:2014-156-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
        },
        {
          "name": "1030331",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1030331"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-3956",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
            },
            {
              "name": "58628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/58628"
            },
            {
              "name": "FreeBSD-SA-14:11",
              "refsource": "FREEBSD",
              "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
            },
            {
              "name": "MDVSA-2015:128",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
            },
            {
              "name": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
            },
            {
              "name": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
            },
            {
              "name": "GLSA-201412-32",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
            },
            {
              "name": "http://www.sendmail.com/sm/open_source/download/8.14.9/",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
            },
            {
              "name": "openSUSE-SU-2014:0804",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
            },
            {
              "name": "MDVSA-2014:147",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
            },
            {
              "name": "FEDORA-2014-7093",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
            },
            {
              "name": "openSUSE-SU-2014:0805",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
            },
            {
              "name": "57455",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/57455"
            },
            {
              "name": "67791",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/67791"
            },
            {
              "name": "http://advisories.mageia.org/MGASA-2014-0270.html",
              "refsource": "CONFIRM",
              "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
            },
            {
              "name": "SSA:2014-156-04",
              "refsource": "SLACKWARE",
              "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
            },
            {
              "name": "1030331",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1030331"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-3956",
    "datePublished": "2014-06-04T10:00:00",
    "dateReserved": "2014-06-03T00:00:00",
    "dateUpdated": "2024-08-06T10:57:18.265Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4565 (GCVE-0-2009-4565)

Vulnerability from cvelistv5 – Published: 2010-01-04 21:00 – Updated: 2024-08-07 07:08
VLAI?
Summary
sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/38314 third-party-advisoryx_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201206-30.xml vendor-advisoryx_refsource_GENTOO
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/39088 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3661 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/37998 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/37543 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2011/0415 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/43366 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.sendmail.org/releases/8.14.4 x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=126953289726317&w=2 vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2010/0719 vdb-entryx_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2011-02… vendor-advisoryx_refsource_REDHAT
http://www.debian.org/security/2010/dsa-1985 vendor-advisoryx_refsource_DEBIAN
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://marc.info/?l=bugtraq&m=126953289726317&w=2 vendor-advisoryx_refsource_HP
http://secunia.com/advisories/40109 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/38915 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/1386 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:08:38.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "38314",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38314"
          },
          {
            "name": "GLSA-201206-30",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
          },
          {
            "name": "1021797",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
          },
          {
            "name": "39088",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39088"
          },
          {
            "name": "ADV-2009-3661",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3661"
          },
          {
            "name": "37998",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37998"
          },
          {
            "name": "37543",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37543"
          },
          {
            "name": "ADV-2011-0415",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0415"
          },
          {
            "name": "43366",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43366"
          },
          {
            "name": "SUSE-SR:2010:006",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
          },
          {
            "name": "oval:org.mitre.oval:def:10255",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.14.4"
          },
          {
            "name": "HPSBUX02508",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
          },
          {
            "name": "ADV-2010-0719",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0719"
          },
          {
            "name": "RHSA-2011:0262",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
          },
          {
            "name": "DSA-1985",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-1985"
          },
          {
            "name": "oval:org.mitre.oval:def:11822",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
          },
          {
            "name": "SSRT100007",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
          },
          {
            "name": "40109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40109"
          },
          {
            "name": "38915",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38915"
          },
          {
            "name": "ADV-2010-1386",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1386"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "sendmail before 8.14.4 does not properly handle a \u0027\\0\u0027 character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "38314",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38314"
        },
        {
          "name": "GLSA-201206-30",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
        },
        {
          "name": "1021797",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
        },
        {
          "name": "39088",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39088"
        },
        {
          "name": "ADV-2009-3661",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3661"
        },
        {
          "name": "37998",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37998"
        },
        {
          "name": "37543",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37543"
        },
        {
          "name": "ADV-2011-0415",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0415"
        },
        {
          "name": "43366",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43366"
        },
        {
          "name": "SUSE-SR:2010:006",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
        },
        {
          "name": "oval:org.mitre.oval:def:10255",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.14.4"
        },
        {
          "name": "HPSBUX02508",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
        },
        {
          "name": "ADV-2010-0719",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0719"
        },
        {
          "name": "RHSA-2011:0262",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
        },
        {
          "name": "DSA-1985",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-1985"
        },
        {
          "name": "oval:org.mitre.oval:def:11822",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
        },
        {
          "name": "SSRT100007",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
        },
        {
          "name": "40109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40109"
        },
        {
          "name": "38915",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38915"
        },
        {
          "name": "ADV-2010-1386",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1386"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4565",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "sendmail before 8.14.4 does not properly handle a \u0027\\0\u0027 character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "38314",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38314"
            },
            {
              "name": "GLSA-201206-30",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
            },
            {
              "name": "1021797",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
            },
            {
              "name": "39088",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39088"
            },
            {
              "name": "ADV-2009-3661",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3661"
            },
            {
              "name": "37998",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37998"
            },
            {
              "name": "37543",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37543"
            },
            {
              "name": "ADV-2011-0415",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0415"
            },
            {
              "name": "43366",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43366"
            },
            {
              "name": "SUSE-SR:2010:006",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
            },
            {
              "name": "oval:org.mitre.oval:def:10255",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
            },
            {
              "name": "http://www.sendmail.org/releases/8.14.4",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.14.4"
            },
            {
              "name": "HPSBUX02508",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
            },
            {
              "name": "ADV-2010-0719",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0719"
            },
            {
              "name": "RHSA-2011:0262",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
            },
            {
              "name": "DSA-1985",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2010/dsa-1985"
            },
            {
              "name": "oval:org.mitre.oval:def:11822",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
            },
            {
              "name": "SSRT100007",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
            },
            {
              "name": "40109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40109"
            },
            {
              "name": "38915",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38915"
            },
            {
              "name": "ADV-2010-1386",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/1386"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4565",
    "datePublished": "2010-01-04T21:00:00",
    "dateReserved": "2010-01-04T00:00:00",
    "dateUpdated": "2024-08-07T07:08:38.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1490 (GCVE-0-2009-1490)

Vulnerability from cvelistv5 – Published: 2009-05-05 19:00 – Updated: 2024-08-07 05:13
VLAI?
Summary
Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.560Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.13.2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
          },
          {
            "name": "sendmail-xheader-bo(50355)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-27T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.13.2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
        },
        {
          "name": "sendmail-xheader-bo(50355)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1490",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sendmail.org/releases/8.13.2",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.13.2"
            },
            {
              "name": "http://www.nmrc.org/~thegnome/blog/apr09/",
              "refsource": "MISC",
              "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
            },
            {
              "name": "sendmail-xheader-bo(50355)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1490",
    "datePublished": "2009-05-05T19:00:00",
    "dateReserved": "2009-04-30T00:00:00",
    "dateUpdated": "2024-08-07T05:13:25.560Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-2423 (GCVE-0-2002-2423)

Vulnerability from cvelistv5 – Published: 2007-11-01 17:00 – Updated: 2024-09-16 17:17
VLAI?
Summary
Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remote attackers to prevent the IP address from being logged via a long IDENT response.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:06:53.908Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "5770",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5770"
          },
          {
            "name": "20020921 Sendmail logging and short string precision allows anonymous commands/relay",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2002/09/msg00267.html"
          },
          {
            "name": "sendmail-ident-logging-bypass(10153)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/10153.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remote attackers to prevent the IP address from being logged via a long IDENT response."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-11-01T17:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "5770",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5770"
        },
        {
          "name": "20020921 Sendmail logging and short string precision allows anonymous commands/relay",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2002/09/msg00267.html"
        },
        {
          "name": "sendmail-ident-logging-bypass(10153)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/10153.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-2423",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remote attackers to prevent the IP address from being logged via a long IDENT response."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "5770",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5770"
            },
            {
              "name": "20020921 Sendmail logging and short string precision allows anonymous commands/relay",
              "refsource": "BUGTRAQ",
              "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2002/09/msg00267.html"
            },
            {
              "name": "sendmail-ident-logging-bypass(10153)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/10153.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-2423",
    "datePublished": "2007-11-01T17:00:00Z",
    "dateReserved": "2007-11-01T00:00:00Z",
    "dateUpdated": "2024-09-16T17:17:37.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-2261 (GCVE-0-2002-2261)

Vulnerability from cvelistv5 – Published: 2007-10-18 10:00 – Updated: 2024-08-08 03:59
VLAI?
Summary
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.sendmail.org/8.12.7.html x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/3539 vdb-entryx_refsource_VUPEN
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://securitytracker.com/id?1005748 vdb-entryx_refsource_SECTRACK
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.securityfocus.com/bid/6548 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/7826 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:59:11.838Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:6892",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6892"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/8.12.7.html"
          },
          {
            "name": "ADV-2009-3539",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3539"
          },
          {
            "name": "oval:org.mitre.oval:def:8512",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8512"
          },
          {
            "name": "1005748",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1005748"
          },
          {
            "name": "20030101-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20030101-01-P"
          },
          {
            "name": "6548",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/6548"
          },
          {
            "name": "sendmail-check-relay-bypass(10775)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10775"
          },
          {
            "name": "7826",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/7826"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-12-03T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the \u0027check_relay\u0027 function by spoofing a blank DNS hostname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:6892",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6892"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/8.12.7.html"
        },
        {
          "name": "ADV-2009-3539",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3539"
        },
        {
          "name": "oval:org.mitre.oval:def:8512",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8512"
        },
        {
          "name": "1005748",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1005748"
        },
        {
          "name": "20030101-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20030101-01-P"
        },
        {
          "name": "6548",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/6548"
        },
        {
          "name": "sendmail-check-relay-bypass(10775)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10775"
        },
        {
          "name": "7826",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/7826"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-2261",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the \u0027check_relay\u0027 function by spoofing a blank DNS hostname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:6892",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6892"
            },
            {
              "name": "http://www.sendmail.org/8.12.7.html",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/8.12.7.html"
            },
            {
              "name": "ADV-2009-3539",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3539"
            },
            {
              "name": "oval:org.mitre.oval:def:8512",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8512"
            },
            {
              "name": "1005748",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1005748"
            },
            {
              "name": "20030101-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20030101-01-P"
            },
            {
              "name": "6548",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/6548"
            },
            {
              "name": "sendmail-check-relay-bypass(10775)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10775"
            },
            {
              "name": "7826",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/7826"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-2261",
    "datePublished": "2007-10-18T10:00:00",
    "dateReserved": "2007-10-17T00:00:00",
    "dateUpdated": "2024-08-08T03:59:11.838Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-1592 (GCVE-0-1999-1592)

Vulnerability from cvelistv5 – Published: 2007-07-12 17:00 – Updated: 2024-09-16 17:03
VLAI?
Summary
Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact. NOTE: this might overlap CVE-1999-0129.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUN
http://www.securityfocus.com/bid/243 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T17:18:07.602Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "00159",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUN",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1"
          },
          {
            "name": "243",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/243"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact.  NOTE: this might overlap CVE-1999-0129."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-07-12T17:00:00Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "00159",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUN"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1"
        },
        {
          "name": "243",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/243"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1592",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact.  NOTE: this might overlap CVE-1999-0129."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "00159",
              "refsource": "SUN",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1"
            },
            {
              "name": "243",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/243"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1592",
    "datePublished": "2007-07-12T17:00:00Z",
    "dateReserved": "2007-07-12T00:00:00Z",
    "dateUpdated": "2024-09-16T17:03:10.002Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-2246 (GCVE-0-2007-2246)

Vulnerability from cvelistv5 – Published: 2007-04-25 16:00 – Updated: 2024-08-07 13:33
VLAI?
Summary
Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors. NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1017966 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/23606 vdb-entryx_refsource_BID
http://www.kb.cert.org/vuls/id/349305 third-party-advisoryx_refsource_CERT-VN
http://secunia.com/advisories/24990 third-party-advisoryx_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2007/1504 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:33:28.308Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1017966",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017966"
          },
          {
            "name": "23606",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23606"
          },
          {
            "name": "VU#349305",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/349305"
          },
          {
            "name": "24990",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24990"
          },
          {
            "name": "SSRT061243",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
          },
          {
            "name": "HPSBUX02183",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
          },
          {
            "name": "ADV-2007-1504",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1504"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-16T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors.  NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-05-02T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1017966",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017966"
        },
        {
          "name": "23606",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23606"
        },
        {
          "name": "VU#349305",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/349305"
        },
        {
          "name": "24990",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24990"
        },
        {
          "name": "SSRT061243",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
        },
        {
          "name": "HPSBUX02183",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
        },
        {
          "name": "ADV-2007-1504",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1504"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2246",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors.  NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1017966",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017966"
            },
            {
              "name": "23606",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23606"
            },
            {
              "name": "VU#349305",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/349305"
            },
            {
              "name": "24990",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24990"
            },
            {
              "name": "SSRT061243",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
            },
            {
              "name": "HPSBUX02183",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
            },
            {
              "name": "ADV-2007-1504",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1504"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2246",
    "datePublished": "2007-04-25T16:00:00",
    "dateReserved": "2007-04-25T00:00:00",
    "dateUpdated": "2024-08-07T13:33:28.308Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-7176 (GCVE-0-2006-7176)

Vulnerability from cvelistv5 – Published: 2007-03-27 23:00 – Updated: 2024-08-07 20:57
VLAI?
Summary
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the "localhost.localdomain" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/25098 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/bugzilla/show_bug.cgi… x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2007-02… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/25743 third-party-advisoryx_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.securityfocus.com/bid/23742 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:39.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "25098",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25098"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
          },
          {
            "name": "RHSA-2007:0252",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
          },
          {
            "name": "25743",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25743"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
          },
          {
            "name": "oval:org.mitre.oval:def:11499",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
          },
          {
            "name": "23742",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23742"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-02T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the \"localhost.localdomain\" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "25098",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25098"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
        },
        {
          "name": "RHSA-2007:0252",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
        },
        {
          "name": "25743",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25743"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
        },
        {
          "name": "oval:org.mitre.oval:def:11499",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
        },
        {
          "name": "23742",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23742"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-7176",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the \"localhost.localdomain\" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "25098",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25098"
            },
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
            },
            {
              "name": "RHSA-2007:0252",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
            },
            {
              "name": "25743",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25743"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
            },
            {
              "name": "oval:org.mitre.oval:def:11499",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
            },
            {
              "name": "23742",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23742"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-7176",
    "datePublished": "2007-03-27T23:00:00",
    "dateReserved": "2007-03-27T00:00:00",
    "dateUpdated": "2024-08-07T20:57:39.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-7175 (GCVE-0-2006-7175)

Vulnerability from cvelistv5 – Published: 2007-03-27 23:00 – Updated: 2024-08-07 20:57
VLAI?
Summary
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:39.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-18T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-10-03T16:21:25",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-7175",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-7175",
    "datePublished": "2007-03-27T23:00:00",
    "dateReserved": "2007-03-27T00:00:00",
    "dateUpdated": "2024-08-07T20:57:39.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4434 (GCVE-0-2006-4434)

Vulnerability from cvelistv5 – Published: 2006-08-29 00:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.openbsd.org/errata.html#sendmail3 vendor-advisoryx_refsource_OPENBSD
http://www.attrition.org/pipermail/vim/2006-Augus… mailing-listx_refsource_VIM
http://securitytracker.com/id?1016753 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/21637 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3994 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/28193 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/21749 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/21700 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1164 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/21641 third-party-advisoryx_refsource_SECUNIA
http://www.sendmail.org/releases/8.13.8.html x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/3393 vdb-entryx_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/bid/19714 vdb-entryx_refsource_BID
http://www.novell.com/linux/security/advisories/2… vendor-advisoryx_refsource_SUSE
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/22369 third-party-advisoryx_refsource_SECUNIA
http://www.openbsd.org/errata38.html#sendmail3 vendor-advisoryx_refsource_OPENBSD
http://secunia.com/advisories/21696 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:07.644Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata.html#sendmail3"
          },
          {
            "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
            "tags": [
              "mailing-list",
              "x_refsource_VIM",
              "x_transferred"
            ],
            "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
          },
          {
            "name": "1016753",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016753"
          },
          {
            "name": "21637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21637"
          },
          {
            "name": "ADV-2006-3994",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3994"
          },
          {
            "name": "28193",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/28193"
          },
          {
            "name": "21749",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21749"
          },
          {
            "name": "21700",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21700"
          },
          {
            "name": "DSA-1164",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1164"
          },
          {
            "name": "21641",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21641"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.13.8.html"
          },
          {
            "name": "ADV-2006-3393",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3393"
          },
          {
            "name": "MDKSA-2006:156",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
          },
          {
            "name": "19714",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19714"
          },
          {
            "name": "SUSE-SR:2006:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
          },
          {
            "name": "102664",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
          },
          {
            "name": "22369",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22369"
          },
          {
            "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata38.html#sendmail3"
          },
          {
            "name": "21696",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21696"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-09T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long \"header line\", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying \"The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-09-02T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata.html#sendmail3"
        },
        {
          "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
          "tags": [
            "mailing-list",
            "x_refsource_VIM"
          ],
          "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
        },
        {
          "name": "1016753",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016753"
        },
        {
          "name": "21637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21637"
        },
        {
          "name": "ADV-2006-3994",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3994"
        },
        {
          "name": "28193",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/28193"
        },
        {
          "name": "21749",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21749"
        },
        {
          "name": "21700",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21700"
        },
        {
          "name": "DSA-1164",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1164"
        },
        {
          "name": "21641",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21641"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.13.8.html"
        },
        {
          "name": "ADV-2006-3393",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3393"
        },
        {
          "name": "MDKSA-2006:156",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
        },
        {
          "name": "19714",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19714"
        },
        {
          "name": "SUSE-SR:2006:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
        },
        {
          "name": "102664",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
        },
        {
          "name": "22369",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22369"
        },
        {
          "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata38.html#sendmail3"
        },
        {
          "name": "21696",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21696"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4434",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long \"header line\", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying \"The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata.html#sendmail3"
            },
            {
              "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
              "refsource": "VIM",
              "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
            },
            {
              "name": "1016753",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016753"
            },
            {
              "name": "21637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21637"
            },
            {
              "name": "ADV-2006-3994",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3994"
            },
            {
              "name": "28193",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/28193"
            },
            {
              "name": "21749",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21749"
            },
            {
              "name": "21700",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21700"
            },
            {
              "name": "DSA-1164",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1164"
            },
            {
              "name": "21641",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21641"
            },
            {
              "name": "http://www.sendmail.org/releases/8.13.8.html",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.13.8.html"
            },
            {
              "name": "ADV-2006-3393",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3393"
            },
            {
              "name": "MDKSA-2006:156",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
            },
            {
              "name": "19714",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19714"
            },
            {
              "name": "SUSE-SR:2006:021",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
            },
            {
              "name": "102664",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
            },
            {
              "name": "22369",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22369"
            },
            {
              "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata38.html#sendmail3"
            },
            {
              "name": "21696",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21696"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4434",
    "datePublished": "2006-08-29T00:00:00",
    "dateReserved": "2006-08-28T00:00:00",
    "dateUpdated": "2024-08-07T19:06:07.644Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1173 (GCVE-0-2006-1173)

Vulnerability from cvelistv5 – Published: 2006-06-07 23:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www-1.ibm.com/support/search.wss?rs=0&q=IY… vendor-advisoryx_refsource_AIXAPAR
http://itrc.hp.com/service/cki/docDisplay.do?docI… vendor-advisoryx_refsource_HP
http://www.debian.org/security/2006/dsa-1155 vendor-advisoryx_refsource_DEBIAN
http://www.openbsd.org/errata38.html#sendmail2 vendor-advisoryx_refsource_OPENBSD
http://secunia.com/advisories/20684 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/442939/100… vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2006/2388 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/20726 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.vupen.com/english/advisories/2006/2351 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/21327 third-party-advisoryx_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-05… vendor-advisoryx_refsource_REDHAT
http://www.vupen.com/english/advisories/2006/2389 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/21647 third-party-advisoryx_refsource_SECUNIA
http://www.fortinet.com/FortiGuardCenter/advisory… x_refsource_CONFIRM
https://issues.rpath.com/browse/RPL-526 x_refsource_CONFIRM
http://secunia.com/advisories/20651 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20683 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20650 third-party-advisoryx_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://secunia.com/advisories/20782 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3135 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1016295 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/20694 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20473 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/2189 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/440744/100… mailing-listx_refsource_BUGTRAQ
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.vupen.com/english/advisories/2006/2798 vdb-entryx_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://www.sendmail.com/security/advisories/SA-20… x_refsource_CONFIRM
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/20673 third-party-advisoryx_refsource_SECUNIA
http://www.f-secure.com/security/fsc-2006-5.shtml x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/438241/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/21612 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20654 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/2390 vdb-entryx_refsource_VUPEN
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.gentoo.org/security/en/glsa/glsa-20060… vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/18433 vdb-entryx_refsource_BID
http://secunia.com/advisories/20675 third-party-advisoryx_refsource_SECUNIA
http://lists.suse.com/archive/suse-security-annou… vendor-advisoryx_refsource_SUSE
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories… vendor-advisoryx_refsource_FREEBSD
http://www.securityfocus.com/archive/1/437928/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/442939/100… vendor-advisoryx_refsource_HP
http://www.kb.cert.org/vuls/id/146718 third-party-advisoryx_refsource_CERT-VN
http://itrc.hp.com/service/cki/docDisplay.do?docI… vendor-advisoryx_refsource_HP
http://secunia.com/advisories/15779 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20641 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20679 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/26197 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/21042 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/21160 third-party-advisoryx_refsource_SECUNIA
http://www-1.ibm.com/support/search.wss?rs=0&q=IY… vendor-advisoryx_refsource_AIXAPAR
http://www.securityfocus.com/archive/1/438330/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IY85415",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
          },
          {
            "name": "HPSBTU02116",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
          },
          {
            "name": "DSA-1155",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1155"
          },
          {
            "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata38.html#sendmail2"
          },
          {
            "name": "20684",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20684"
          },
          {
            "name": "HPSBUX02124",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
          },
          {
            "name": "ADV-2006-2388",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2388"
          },
          {
            "name": "20726",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20726"
          },
          {
            "name": "oval:org.mitre.oval:def:11253",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
          },
          {
            "name": "ADV-2006-2351",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2351"
          },
          {
            "name": "21327",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21327"
          },
          {
            "name": "RHSA-2006:0515",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
          },
          {
            "name": "ADV-2006-2389",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2389"
          },
          {
            "name": "21647",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21647"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-526"
          },
          {
            "name": "20651",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20651"
          },
          {
            "name": "20683",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20683"
          },
          {
            "name": "20650",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20650"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
          },
          {
            "name": "20782",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20782"
          },
          {
            "name": "ADV-2006-3135",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3135"
          },
          {
            "name": "1016295",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016295"
          },
          {
            "name": "20694",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20694"
          },
          {
            "name": "20473",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20473"
          },
          {
            "name": "ADV-2006-2189",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2189"
          },
          {
            "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
          },
          {
            "name": "20060601-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
          },
          {
            "name": "ADV-2006-2798",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2798"
          },
          {
            "name": "102460",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
          },
          {
            "name": "20060602-01-U",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
          },
          {
            "name": "MDKSA-2006:104",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
          },
          {
            "name": "sendmail-multipart-mime-dos(27128)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
          },
          {
            "name": "20673",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20673"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
          },
          {
            "name": "20060621 Re: Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
          },
          {
            "name": "21612",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21612"
          },
          {
            "name": "20654",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20654"
          },
          {
            "name": "ADV-2006-2390",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2390"
          },
          {
            "name": "SSA:2006-166-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
          },
          {
            "name": "GLSA-200606-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
          },
          {
            "name": "18433",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18433"
          },
          {
            "name": "20675",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20675"
          },
          {
            "name": "SUSE-SA:2006:032",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
          },
          {
            "name": "FreeBSD-SA-06:17.sendmail",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
          },
          {
            "name": "20060620 Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
          },
          {
            "name": "SSRT061159",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
          },
          {
            "name": "VU#146718",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/146718"
          },
          {
            "name": "SSRT061135",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
          },
          {
            "name": "15779",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15779"
          },
          {
            "name": "20641",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20641"
          },
          {
            "name": "20679",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20679"
          },
          {
            "name": "26197",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/26197"
          },
          {
            "name": "21042",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21042"
          },
          {
            "name": "21160",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21160"
          },
          {
            "name": "IY85930",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
          },
          {
            "name": "20060624 Re: Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-06T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T14:57:01",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "IY85415",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
        },
        {
          "name": "HPSBTU02116",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
        },
        {
          "name": "DSA-1155",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1155"
        },
        {
          "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata38.html#sendmail2"
        },
        {
          "name": "20684",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20684"
        },
        {
          "name": "HPSBUX02124",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
        },
        {
          "name": "ADV-2006-2388",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2388"
        },
        {
          "name": "20726",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20726"
        },
        {
          "name": "oval:org.mitre.oval:def:11253",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
        },
        {
          "name": "ADV-2006-2351",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2351"
        },
        {
          "name": "21327",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21327"
        },
        {
          "name": "RHSA-2006:0515",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
        },
        {
          "name": "ADV-2006-2389",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2389"
        },
        {
          "name": "21647",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21647"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-526"
        },
        {
          "name": "20651",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20651"
        },
        {
          "name": "20683",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20683"
        },
        {
          "name": "20650",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20650"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
        },
        {
          "name": "20782",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20782"
        },
        {
          "name": "ADV-2006-3135",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3135"
        },
        {
          "name": "1016295",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016295"
        },
        {
          "name": "20694",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20694"
        },
        {
          "name": "20473",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20473"
        },
        {
          "name": "ADV-2006-2189",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2189"
        },
        {
          "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
        },
        {
          "name": "20060601-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
        },
        {
          "name": "ADV-2006-2798",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2798"
        },
        {
          "name": "102460",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
        },
        {
          "name": "20060602-01-U",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
        },
        {
          "name": "MDKSA-2006:104",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
        },
        {
          "name": "sendmail-multipart-mime-dos(27128)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
        },
        {
          "name": "20673",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20673"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
        },
        {
          "name": "20060621 Re: Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
        },
        {
          "name": "21612",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21612"
        },
        {
          "name": "20654",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20654"
        },
        {
          "name": "ADV-2006-2390",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2390"
        },
        {
          "name": "SSA:2006-166-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
        },
        {
          "name": "GLSA-200606-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
        },
        {
          "name": "18433",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18433"
        },
        {
          "name": "20675",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20675"
        },
        {
          "name": "SUSE-SA:2006:032",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
        },
        {
          "name": "FreeBSD-SA-06:17.sendmail",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
        },
        {
          "name": "20060620 Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
        },
        {
          "name": "SSRT061159",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
        },
        {
          "name": "VU#146718",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/146718"
        },
        {
          "name": "SSRT061135",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
        },
        {
          "name": "15779",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15779"
        },
        {
          "name": "20641",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20641"
        },
        {
          "name": "20679",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20679"
        },
        {
          "name": "26197",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/26197"
        },
        {
          "name": "21042",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21042"
        },
        {
          "name": "21160",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21160"
        },
        {
          "name": "IY85930",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
        },
        {
          "name": "20060624 Re: Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2006-1173",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IY85415",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
            },
            {
              "name": "HPSBTU02116",
              "refsource": "HP",
              "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
            },
            {
              "name": "DSA-1155",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1155"
            },
            {
              "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata38.html#sendmail2"
            },
            {
              "name": "20684",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20684"
            },
            {
              "name": "HPSBUX02124",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
            },
            {
              "name": "ADV-2006-2388",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2388"
            },
            {
              "name": "20726",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20726"
            },
            {
              "name": "oval:org.mitre.oval:def:11253",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
            },
            {
              "name": "ADV-2006-2351",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2351"
            },
            {
              "name": "21327",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21327"
            },
            {
              "name": "RHSA-2006:0515",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
            },
            {
              "name": "ADV-2006-2389",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2389"
            },
            {
              "name": "21647",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21647"
            },
            {
              "name": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html",
              "refsource": "CONFIRM",
              "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-526",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-526"
            },
            {
              "name": "20651",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20651"
            },
            {
              "name": "20683",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20683"
            },
            {
              "name": "20650",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20650"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
            },
            {
              "name": "20782",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20782"
            },
            {
              "name": "ADV-2006-3135",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3135"
            },
            {
              "name": "1016295",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016295"
            },
            {
              "name": "20694",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20694"
            },
            {
              "name": "20473",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20473"
            },
            {
              "name": "ADV-2006-2189",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2189"
            },
            {
              "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
            },
            {
              "name": "20060601-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
            },
            {
              "name": "ADV-2006-2798",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2798"
            },
            {
              "name": "102460",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
            },
            {
              "name": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
            },
            {
              "name": "20060602-01-U",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
            },
            {
              "name": "MDKSA-2006:104",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
            },
            {
              "name": "sendmail-multipart-mime-dos(27128)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
            },
            {
              "name": "20673",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20673"
            },
            {
              "name": "http://www.f-secure.com/security/fsc-2006-5.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
            },
            {
              "name": "20060621 Re: Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
            },
            {
              "name": "21612",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21612"
            },
            {
              "name": "20654",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20654"
            },
            {
              "name": "ADV-2006-2390",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2390"
            },
            {
              "name": "SSA:2006-166-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
            },
            {
              "name": "GLSA-200606-19",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
            },
            {
              "name": "18433",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18433"
            },
            {
              "name": "20675",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20675"
            },
            {
              "name": "SUSE-SA:2006:032",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
            },
            {
              "name": "FreeBSD-SA-06:17.sendmail",
              "refsource": "FREEBSD",
              "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
            },
            {
              "name": "20060620 Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
            },
            {
              "name": "SSRT061159",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
            },
            {
              "name": "VU#146718",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/146718"
            },
            {
              "name": "SSRT061135",
              "refsource": "HP",
              "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
            },
            {
              "name": "15779",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15779"
            },
            {
              "name": "20641",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20641"
            },
            {
              "name": "20679",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20679"
            },
            {
              "name": "26197",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/26197"
            },
            {
              "name": "21042",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21042"
            },
            {
              "name": "21160",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21160"
            },
            {
              "name": "IY85930",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
            },
            {
              "name": "20060624 Re: Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2006-1173",
    "datePublished": "2006-06-07T23:00:00",
    "dateReserved": "2006-03-12T00:00:00",
    "dateUpdated": "2024-08-07T17:03:28.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CERTA-2006-ALE-003

Vulnerability from certfr_alerte - Published: 2006-03-24 - Updated: 2006-03-24

Une vulnérabilité dans le logiciel de messagerie Sendmail permet à un utilisateur distant mal intentionné d'exécuter du code arbitraire à distance. Le fort déploiement de Sendmail combiné à la gravité de la faille a conduit le CERTA à augmenter le niveau de vigilence au niveau d'alerte, en plus de l'avis CERTA-2006-AVI-124 publié la jeudi 23 mars 2006.
L'objectif de cette alerte est de sensibiliser les utilisateurs à la nécessité d'appliquer les correctifs en fonction des systèmes concernés.

Description

Sendmail est un logiciel de routage de messages électroniques (Mail Transport Agent ou MTA).
Une vulnérabilité dans la gestion de messages asynchrones par le logiciel Sendmail permet à un utilisateur distant mal intentionné d'exécuter du code arbitraire à distance sur la machine vulnérable.

Solution

Mettre à jour Sendmail en version 8.13.6. En plus de ce problème de sécurité, Sendmail version 8.13.6 corrige d'autres problèmes de sécurité et d'autres faiblesses dans le code. Sendmail 8.13.6 peut se télécharger à l'adresse suivante :

http://www.sendmail.org/8.13.6.html

Si la mise à jour de Sendmail en version 8.13.6 n'est paspossible, appliquer les correctifs pour Sendmail 8.12.11 et 8.13.5.Les correctifs sont disponibles aux adresses suivantes :

ftp://ftp.sendmail.org/pub/sendmail/8.12.11.p0

ftp://ftp.sendmail.org/pub/sendmail/8.13.5.p0

Dans tous les cas, se référer au bulletin de sécurité del'éditeur pour l'obtention des correctifs (cf. sectionDocumentation).

None
Impacted products
Vendor Product Description
Sendmail sendmail Pour la branche 8.12.x, Sendmail version 8.12.11 et versions antérieures ;
Sendmail sendmail pour la branche 8.13.x, Sendmail version 8.13.5 et versions antérieures.
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Pour la branche 8.12.x, Sendmail version 8.12.11 et versions ant\u00e9rieures ;",
      "product": {
        "name": "sendmail",
        "vendor": {
          "name": "Sendmail",
          "scada": false
        }
      }
    },
    {
      "description": "pour la branche 8.13.x, Sendmail version 8.13.5 et versions ant\u00e9rieures.",
      "product": {
        "name": "sendmail",
        "vendor": {
          "name": "Sendmail",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "closed_at": "2006-03-24",
  "content": "## Description\n\nSendmail est un logiciel de routage de messages \u00e9lectroniques (Mail\nTransport Agent ou MTA).  \nUne vuln\u00e9rabilit\u00e9 dans la gestion de messages asynchrones par le\nlogiciel Sendmail permet \u00e0 un utilisateur distant mal intentionn\u00e9\nd\u0027ex\u00e9cuter du code arbitraire \u00e0 distance sur la machine vuln\u00e9rable.\n\n## Solution\n\nMettre \u00e0 jour Sendmail en version 8.13.6. En plus de ce probl\u00e8me de\ns\u00e9curit\u00e9, Sendmail version 8.13.6 corrige d\u0027autres probl\u00e8mes de s\u00e9curit\u00e9\net d\u0027autres faiblesses dans le code. Sendmail 8.13.6 peut se t\u00e9l\u00e9charger\n\u00e0 l\u0027adresse suivante :\n\n    http://www.sendmail.org/8.13.6.html\n\nSi la mise \u00e0 jour de Sendmail en version 8.13.6 n\u0027est paspossible,\nappliquer les correctifs pour Sendmail 8.12.11 et 8.13.5.Les correctifs\nsont disponibles aux adresses suivantes :\n\n    ftp://ftp.sendmail.org/pub/sendmail/8.12.11.p0\n\n    ftp://ftp.sendmail.org/pub/sendmail/8.13.5.p0\n\nDans tous les cas, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 del\u0027\u00e9diteur pour\nl\u0027obtention des correctifs (cf. sectionDocumentation).\n",
  "cves": [
    {
      "name": "CVE-2006-0058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-0058"
    }
  ],
  "initial_release_date": "2006-03-24T00:00:00",
  "last_revision_date": "2006-03-24T00:00:00",
  "links": [
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 pour Fedora du 22 mars 2006 :",
      "url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1015 du 23 mars 2006 :",
      "url": "http://www.debian.org/security/2006/dsa-1015"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200603-21 du 22 mars 2006    :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2006:058 du 22 mars    2006 :",
      "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:058"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 ISS du 22 mars 2006 :",
      "url": "http://xforce.iss.net/xforce/alerts/id/216"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM AIX du 23 mars 2006 :",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY82992"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM AIX du 23 mars 2006 :",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY82994"
    },
    {
      "title": "Site Internet de Sendmail :",
      "url": "http://www.sendmail.com"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0265 du 22 mars 2006    :",
      "url": "http://rhn.redhat.com/errata/RHSA-2006-0265.html"
    },
    {
      "title": "Alerte de s\u00e9curit\u00e9 de l\u0027US-CERT TA06-081A et VU#834865 du    22 mars 2006 :",
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-081A.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0264 du 22 mars 2006    :",
      "url": "http://rhn.redhat.com/errata/RHSA-2006-0264.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM AIX du 23 mars 2006 :",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY82993"
    },
    {
      "title": "Page Internet de la version 8.13.6 de Sendmail :",
      "url": "http://www.sendmail.org/8.13.6.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 CERTA-2006-AVI-124 du jeudi 23 mars    2006 :",
      "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2006-AVI-124/index.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 FreeBSD SA-06:13.sendmail du 22 mars    2006 :",
      "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc"
    },
    {
      "title": "Alerte de s\u00e9curit\u00e9 de l\u0027US-CERT TA06-081A et VU#834865 du    22 mars 2006 :",
      "url": "http://www.kb.cert.org/vuls/id/834865"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Sendmail du 22 mars 2006 :",
      "url": "http://www.sendmail.com/company/advisory/index.shtml"
    },
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 pour Fedora du 22 mars 2006 :",
      "url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Sun Alerte #102262 du 22 mars 2006 :",
      "url": "http://sunsolve.sun.com/search/document.do?assetKey=1-26-102262-1"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Slackware SSA:2006-081-01 du 22 mars    2003 :",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.619600"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SuSE-SA:2006:017 du 22 mars 2006    :",
      "url": "http://www.novell.com/linux/security/advisories/2006_17_sendmail.html"
    }
  ],
  "reference": "CERTA-2006-ALE-003",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2006-03-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans le logiciel de messagerie Sendmail permet \u00e0 un\nutilisateur distant mal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire \u00e0\ndistance. Le fort d\u00e9ploiement de Sendmail combin\u00e9 \u00e0 la gravit\u00e9 de la\nfaille a conduit le CERTA \u00e0 augmenter le niveau de vigilence au niveau\nd\u0027alerte, en plus de l\u0027avis CERTA-2006-AVI-124 publi\u00e9 la jeudi 23 mars\n2006.  \n\u003cspan class=\"textbf\"\u003eL\u0027objectif de cette alerte est de sensibiliser les\nutilisateurs \u00e0 la n\u00e9cessit\u00e9 d\u0027appliquer les correctifs en fonction des\nsyst\u00e8mes concern\u00e9s\u003c/span\u003e.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de Sendmail",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 du CERTA CERTA-2006-AVI-124 du 23 mars 2006",
      "url": null
    }
  ]
}

CERTA-2006-AVI-124

Vulnerability from certfr_avis - Published: 2006-03-23 - Updated: 2006-06-23

Une vulnérabilité dans le logiciel de messagerie Sendmail permet à un utilisateur distant mal intentionné d'exécuter du code arbitraire à distance.

Description

Sendmail est un logiciel de routage de messages électroniques (Mail Transport Agent ou MTA).
Une vulnérabilité dans la gestion de messages asynchrones par le logiciel Sendmail permet à un utilisateur distant mal intentionné d'exécuter du code arbitraire à distance sur la machine vulnérable.

Solution

Mettre à jour Sendmail en version 8.13.6. En plus de ce problème de sécurité, Sendmail version 8.13.6 corrige d'autres problèmes de sécurité et d'autres faiblesses dans le code. Sendmail 8.13.6 peut se télécharger à l'adresse suivante :

http://www.sendmail.org/8.13.6.html

Si la mise à jour de Sendmail en version 8.13.6 n'est paspossible, appliquer les correctifs pour Sendmail 8.12.11 et 8.13.5.Les correctifs sont disponibles aux adresses suivantes :

ftp://ftp.sendmail.org/pub/sendmail/8.12.11.p0

ftp://ftp.sendmail.org/pub/sendmail/8.13.5.p0

Dans tous les cas, se référer au bulletin de sécurité del'éditeur pour l'obtention des correctifs (cf. sectionDocumentation).

None
Impacted products
Vendor Product Description
Sendmail sendmail Pour la branche 8.12.x, Sendmail version 8.12.11 et versions antérieures ;
Sendmail sendmail pour la branche 8.13.x, Sendmail version 8.13.5 et versions antérieures.
References
Bulletin de sécurité Sendmail du 22 mars 2006 None vendor-advisory
Mises à jour de sécurité pour Fedora du 22 mars 2006 : - other
Bulletin de sécurité Avaya ASA-2006-078 du 12 avril 2006 : - other
Bulletin de sécurité Debian DSA-1015 du 23 mars 2006 : - other
Bulletin de sécurité Gentoo GLSA-200603-21 du 22 mars 2006 : - other
Bulletin de sécurité Mandriva MDKSA-2006:058 du 22 mars 2006 : - other
Bulletin de sécurité OpenBSD 3.8 et OpenBSD 3.9 pour sendmail du 25 mars 2006 : - other
Bulletin de sécurité ISS du 22 mars 2006 : - other
Bulletin de sécurité IBM AIX du 23 mars 2006 : - other
Bulletin de sécurité Avaya ASA-2006-074 du 24 mars 2006 : - other
Bulletin de sécurité IBM AIX du 23 mars 2006 : - other
Site Internet de Sendmail : - other
Bulletin de sécurité RedHat RHSA-2006:0265 du 22 mars 2006 : - other
Bulletin de sécurité de SGI du 4 avril 2006 : - other
Alerte de sécurité de l'US-CERT TA06-081A et VU#834865 du 22 mars 2006 : - other
Bulletin de sécurité HP-UX #c00629555 (HPSBUX02108 SSRT061133) du 25 mars 2006 : - other
Bulletin de sécurité OpenBSD 3.8 et OpenBSD 3.9 pour sendmail du 25 mars 2006 : - other
Bulletin de sécurité RedHat RHSA-2006:0264 du 22 mars 2006 : - other
Bulletin de sécurité IBM AIX du 23 mars 2006 : - other
Page Internet de la version 8.13.6 de Sendmail : - other
Bulletin de sécurité IBM : - other
Bulletin de sécurité FreeBSD SA-06:13.sendmail du 22 mars 2006 : - other
Alerte de sécurité de l'US-CERT TA06-081A et VU#834865 du 22 mars 2006 : - other
Mises à jour de sécurité pour Fedora du 22 mars 2006 : - other
Bulletin de sécurité Sun Alerte #102262 du 22 mars 2006 : - other
Bulletin de sécurité Slackware SSA:2006-081-01 du 22 mars 2003 : - other
Bulletin de sécurité SUSE SuSE-SA:2006:017 du 22 mars 2006 : - other

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Pour la branche 8.12.x, Sendmail version 8.12.11 et versions ant\u00e9rieures ;",
      "product": {
        "name": "sendmail",
        "vendor": {
          "name": "Sendmail",
          "scada": false
        }
      }
    },
    {
      "description": "pour la branche 8.13.x, Sendmail version 8.13.5 et versions ant\u00e9rieures.",
      "product": {
        "name": "sendmail",
        "vendor": {
          "name": "Sendmail",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "content": "## Description\n\nSendmail est un logiciel de routage de messages \u00e9lectroniques (Mail\nTransport Agent ou MTA).  \nUne vuln\u00e9rabilit\u00e9 dans la gestion de messages asynchrones par le\nlogiciel Sendmail permet \u00e0 un utilisateur distant mal intentionn\u00e9\nd\u0027ex\u00e9cuter du code arbitraire \u00e0 distance sur la machine vuln\u00e9rable.\n\n## Solution\n\nMettre \u00e0 jour Sendmail en version 8.13.6. En plus de ce probl\u00e8me de\ns\u00e9curit\u00e9, Sendmail version 8.13.6 corrige d\u0027autres probl\u00e8mes de s\u00e9curit\u00e9\net d\u0027autres faiblesses dans le code. Sendmail 8.13.6 peut se t\u00e9l\u00e9charger\n\u00e0 l\u0027adresse suivante :\n\n    http://www.sendmail.org/8.13.6.html\n\nSi la mise \u00e0 jour de Sendmail en version 8.13.6 n\u0027est paspossible,\nappliquer les correctifs pour Sendmail 8.12.11 et 8.13.5.Les correctifs\nsont disponibles aux adresses suivantes :\n\n    ftp://ftp.sendmail.org/pub/sendmail/8.12.11.p0\n\n    ftp://ftp.sendmail.org/pub/sendmail/8.13.5.p0\n\nDans tous les cas, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 del\u0027\u00e9diteur pour\nl\u0027obtention des correctifs (cf. sectionDocumentation).\n",
  "cves": [
    {
      "name": "CVE-2006-0058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-0058"
    }
  ],
  "initial_release_date": "2006-03-23T00:00:00",
  "last_revision_date": "2006-06-23T00:00:00",
  "links": [
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 pour Fedora du 22 mars 2006 :",
      "url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2006-078 du 12 avril 2006 :",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1015 du 23 mars 2006 :",
      "url": "http://www.debian.org/security/2006/dsa-1015"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200603-21 du 22 mars 2006    :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2006:058 du 22 mars    2006 :",
      "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:058"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 OpenBSD 3.8 et OpenBSD 3.9 pour    sendmail du 25 mars 2006 :",
      "url": "http://www.openbsd.org/errata38.html#sendmail"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 ISS du 22 mars 2006 :",
      "url": "http://xforce.iss.net/xforce/alerts/id/216"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM AIX du 23 mars 2006 :",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY82992"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Avaya ASA-2006-074 du 24 mars 2006 :",
      "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-074.htm"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM AIX du 23 mars 2006 :",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY82994"
    },
    {
      "title": "Site Internet de Sendmail :",
      "url": "http://www.sendmail.com"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0265 du 22 mars 2006    :",
      "url": "http://rhn.redhat.com/errata/RHSA-2006-0265.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 de SGI du 4 avril 2006 :",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20060302-01-P.asc"
    },
    {
      "title": "Alerte de s\u00e9curit\u00e9 de l\u0027US-CERT TA06-081A et VU#834865 du    22 mars 2006 :",
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-081A.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 HP-UX #c00629555 (HPSBUX02108    SSRT061133) du 25 mars 2006 :",
      "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00629555"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 OpenBSD 3.8 et OpenBSD 3.9 pour    sendmail du 25 mars 2006 :",
      "url": "http://www.openbsd.org/errata.html#sendmail"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0264 du 22 mars 2006    :",
      "url": "http://rhn.redhat.com/errata/RHSA-2006-0264.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM AIX du 23 mars 2006 :",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY82993"
    },
    {
      "title": "Page Internet de la version 8.13.6 de Sendmail :",
      "url": "http://www.sendmail.org/8.13.6.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM :",
      "url": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 FreeBSD SA-06:13.sendmail du 22 mars    2006 :",
      "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc"
    },
    {
      "title": "Alerte de s\u00e9curit\u00e9 de l\u0027US-CERT TA06-081A et VU#834865 du    22 mars 2006 :",
      "url": "http://www.kb.cert.org/vuls/id/834865"
    },
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 pour Fedora du 22 mars 2006 :",
      "url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Sun Alerte #102262 du 22 mars 2006 :",
      "url": "http://sunsolve.sun.com/search/document.do?assetKey=1-26-102262-1"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Slackware SSA:2006-081-01 du 22 mars    2003 :",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.619600"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SuSE-SA:2006:017 du 22 mars 2006    :",
      "url": "http://www.novell.com/linux/security/advisories/2006_17_sendmail.html"
    }
  ],
  "reference": "CERTA-2006-AVI-124",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2006-03-23T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 OpenBSD et Avaya.",
      "revision_date": "2006-03-27T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 SGI IRIX.",
      "revision_date": "2006-04-05T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 Avaya.",
      "revision_date": "2006-04-18T00:00:00.000000"
    },
    {
      "description": "ajout de la r\u00e9f\u00e9rence au bulletin de s\u00e9curit\u00e9 IBM.",
      "revision_date": "2006-06-23T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans le logiciel de messagerie Sendmail permet \u00e0 un\nutilisateur distant mal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire \u00e0\ndistance.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de Sendmail",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 Sendmail du 22 mars 2006",
      "url": "http://www.sendmail.com/company/advisory/index.shtml"
    }
  ]
}