Search criteria

74 vulnerabilities found for sendmail by Sendmail

VAR-200310-0072

Vulnerability from variot - Updated: 2025-12-22 20:29

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. sendmail A buffer overflow vulnerability was discovered in the email address parsing process. This vulnerability CERT Advisory CA-2003-07, CA-2003-12 This is a new vulnerability that differs from the vulnerability reported in. As for the vulnerability, there is a possibility that a third party may obtain administrator authority from a remote location. This problem, sendmail Occurs by receiving a message with a maliciously configured email address. For this reason, LAN Is running on a host sendmail Even other MTA (Mail Transfer Agent) If you receive a malicious message relayed from, you may be affected by the vulnerability.Service operation interruption (denial-of-service, DoS) An attacker or a remote third party may gain administrative privileges. This issue is different than the vulnerability described in BID 7230. Sendmail is one of the most popular mail transfer agents (MTAs) on the Internet. The local exploitation method on Linux can use recipient.c and sendtolist() to overwrite the pointer with the data submitted by the user. When calling the free() function, the command may be redirected, and the attacker can construct a malicious email message and submit it to Sendmail for analysis. Execute arbitrary commands on the system with Sendmail process privileges. There may also be other exploit methods, and it is also possible to exploit this vulnerability remotely

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200310-0072",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.6.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.5"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.1"
      },
      {
        "model": "advanced server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.6"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.4.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "1.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "0.7"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "0.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "9.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.17m"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk3_bl17"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.19f"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.4"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.20m"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk4_bl18"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.18f"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk5_bl19"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.0.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b_pk1_bl1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g_pk4_bl22"
      },
      {
        "model": "pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk7_bl18"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.00"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk2_bl2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk3_bl3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.1a"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk4_bl21"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.17f"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.3"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b_pk2_bl22"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.4"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.7"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.21m"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.9"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk5_bl23"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g_pk3_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk6_bl20"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.21f"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "3.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk8_bl22"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.8"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk1_bl1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.6"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.19m"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.18m"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "8.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk6_bl17"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.20f"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.0"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "conectiva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm eserver",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mandrakesoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "secure computing",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sendmail consortium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "turbolinux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wirex",
        "version": null
      },
      {
        "model": "cobalt raq4",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "openlinux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "3.1.1 (server)"
      },
      {
        "model": "open unix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "8.0.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (sparc)"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "3.0.x (solaris"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.00"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "linux"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.0"
      },
      {
        "model": "systemwalker it budgetmgr",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix edition )"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "8.0"
      },
      {
        "model": "for nt",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.6.x"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.3"
      },
      {
        "model": "systemwalker listcreator",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "openbsd",
        "version": "3.3"
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.12.9 and earlier"
      },
      {
        "model": "for nt",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "version 3.0.x"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "7.1.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.2.xj (windows nt/2000 edition )"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.2.x (solaris"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.1"
      },
      {
        "model": "openbsd",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "openbsd",
        "version": "version"
      },
      {
        "model": "linux advanced workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "linux"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix edition )"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "9"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.11"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "windows nt/2000"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.2"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "1.3 (windows 2000 edition )"
      },
      {
        "model": "teamware office",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.22"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.23"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sgi",
        "version": "6.5 (6.5.15 - 6.5.21f)"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.1.x (solaris"
      },
      {
        "model": "openlinux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "3.1.1 (workstation)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "3.1.x (solaris"
      },
      {
        "model": "bsd/os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "fore tune",
        "version": "5.0"
      },
      {
        "model": "cobalt qube3",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "interstage office square",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (ws)"
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "openbsd",
        "version": "3.2"
      },
      {
        "model": "gnu/linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "debian",
        "version": "3.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.1.x (hp-ux edition )"
      },
      {
        "model": "freebsd",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "freebsd",
        "version": "version"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.0"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "7.1.3"
      },
      {
        "model": "cobalt raqxtr",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (x86)"
      },
      {
        "model": "linux 5.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "turbolinux advanced server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (as)"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.04"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "bsd/os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "fore tune",
        "version": "4.3.1"
      },
      {
        "model": "gnu/linux",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "debian",
        "version": "version"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (es)"
      },
      {
        "model": "systemwalker listworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.0.x (solaris"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "s390 linux edition )"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "1.2 (solaris"
      },
      {
        "model": "systemwalker ip netmgr",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "s390 linux edition )"
      },
      {
        "model": "cobalt raq550",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "4.3"
      },
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "9"
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 7.0 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 2.6 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.0.7"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "550"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.21"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.21"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "inc sendmail pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "inc sendmail pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.9"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "consortium sendmail beta7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "beta",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5x86"
      },
      {
        "model": "sh3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "linux rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.1"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "-release-p5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "-release-p14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "-prerelease",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "-release-p7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "-release-p17",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "-release-p20",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "-release-p32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "-release-p42",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "-release-p38",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "3.0"
      },
      {
        "model": "tru64 b pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 b pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 g pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 g pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f pk8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f pk7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.22"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.10"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:debian:debian_linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:freebsd:freebsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ibm:aix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:netbsd:netbsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:openbsd:openbsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sco:open_unix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sco:openlinux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sco:unixware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sgi:irix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_qube_3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_4",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_550",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_xtr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sun:linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sun:solaris",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_advanced_message_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_for_nt",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_advanced_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_workstation",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:hp-ux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:bsdi:bsd_os",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:linux_advanced_workstation",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage_office_square",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_ip_netmgr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_it_budgetmgr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_listcreator",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_listworks",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:teamware_office",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michal Zalewski\u203b lcamtuf@echelon.pl",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2003-0694",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2003-0694",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-7519",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2003-0694",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#784980",
            "trust": 0.8,
            "value": "36.72"
          },
          {
            "author": "NVD",
            "id": "CVE-2003-0694",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200310-019",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-7519",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2003-0694",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. sendmail A buffer overflow vulnerability was discovered in the email address parsing process. This vulnerability CERT Advisory CA-2003-07, CA-2003-12 This is a new vulnerability that differs from the vulnerability reported in. As for the vulnerability, there is a possibility that a third party may obtain administrator authority from a remote location. This problem, sendmail Occurs by receiving a message with a maliciously configured email address. For this reason, LAN Is running on a host sendmail Even other MTA (Mail Transfer Agent) If you receive a malicious message relayed from, you may be affected by the vulnerability.Service operation interruption (denial-of-service, DoS) An attacker or a remote third party may gain administrative privileges.  This issue is different than the vulnerability described in BID 7230. Sendmail is one of the most popular mail transfer agents (MTAs) on the Internet. The local exploitation method on Linux can use recipient.c and sendtolist() to overwrite the pointer with the data submitted by the user. When calling the free() function, the command may be redirected, and the attacker can construct a malicious email message and submit it to Sendmail for analysis. Execute arbitrary commands on the system with Sendmail process privileges. There may also be other exploit methods, and it is also possible to exploit this vulnerability remotely",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      },
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#784980",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "8641",
        "trust": 1.3
      },
      {
        "db": "XF",
        "id": "13204",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019",
        "trust": 0.7
      },
      {
        "db": "CONECTIVA",
        "id": "CLA-2003:742",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:284",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:283",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2003-25",
        "trust": 0.6
      },
      {
        "db": "VULNWATCH",
        "id": "20030917 ZALEWSKI ADVISORY - SENDMAIL 8.12.9 PRESCAN BUG",
        "trust": 0.6
      },
      {
        "db": "SCO",
        "id": "SCOSA-2004.11",
        "trust": 0.6
      },
      {
        "db": "MANDRAKE",
        "id": "MDKSA-2003:092",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030917 GLSA: SENDMAIL (200309-13)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030917 [SLACKWARE-SECURITY] SENDMAIL VULNERABILITIES FIXED (SSA:2003-260-02)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030917 SENDMAIL 8.12.9 PRESCAN BUG (A NEW ONE) [CAN-2003-0694]",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030919 [OPENPKG-SA-2003.041] OPENPKG SECURITY ADVISORY (SENDMAIL)",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:603",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:2975",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:572",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20030917 SENDMAIL 8.12.9 PRESCAN BUG (A NEW ONE) [CAN-2003-0694]",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-384",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "id": "VAR-200310-0072",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-12-22T20:29:58.312000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "ca-2003-25",
        "trust": 0.8,
        "url": "http://software.fujitsu.com/jp/security/vulnerabilities/cert/cert2003.html#ca-2003-25"
      },
      {
        "title": "DSA-384-1",
        "trust": 0.8,
        "url": "http://www.debian.org/security/2003/dsa-384"
      },
      {
        "title": "FreeBSD-SA-03:13.sendmail ",
        "trust": 0.8,
        "url": "http://security.freebsd.org/advisories/FreeBSD-SA-03:13.sendmail.asc"
      },
      {
        "title": "HPSBUX00281",
        "trust": 0.8,
        "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01035741"
      },
      {
        "title": "IY48657",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY48657"
      },
      {
        "title": "IY48659",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY48659"
      },
      {
        "title": "IY48658",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY48658"
      },
      {
        "title": "MSS-OAR-E01-2003.1473.1",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/MSS/MSS-OAR-E01-2003.1473.1"
      },
      {
        "title": "sendmail (V2.x)",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/update/linux/list.php?errata_id=150"
      },
      {
        "title": "NetBSD-SA2003-016",
        "trust": 0.8,
        "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-016.txt.asc"
      },
      {
        "title": "018: SECURITY FIX: September 17, 2003",
        "trust": 0.8,
        "url": "http://www.openbsd.org/errata32.html#sendmail4"
      },
      {
        "title": "005: SECURITY FIX: September 17, 2003",
        "trust": 0.8,
        "url": "http://www.openbsd.org/errata33.html#sendmail"
      },
      {
        "title": "RHSA-2003:283",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2003-283.html"
      },
      {
        "title": "RHSA-2003:284",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2003-284.html"
      },
      {
        "title": "CSSA-2003-036.0",
        "trust": 0.8,
        "url": "ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-036.0.txt"
      },
      {
        "title": "CSSA-2003-SCO.23.1",
        "trust": 0.8,
        "url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.23/CSSA-2003-SCO.23.txt"
      },
      {
        "title": "8.12.10",
        "trust": 0.8,
        "url": "http://www.sendmail.org/8.12.10.html"
      },
      {
        "title": "2003-9-17",
        "trust": 0.8,
        "url": "http://www.sendmail.com/security/"
      },
      {
        "title": "20030903-01-P",
        "trust": 0.8,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20030903-01-P.asc"
      },
      {
        "title": "56922",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-1"
      },
      {
        "title": "56860",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56860-1"
      },
      {
        "title": "56922",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-3"
      },
      {
        "title": "56860",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56860-3"
      },
      {
        "title": "XTR Sendmail Security Update 1.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "550 Sendmail Security Update 0.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "4 Sendmail Security Update 2.0.2",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "TLSA-2003-52",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2003/TLSA-2003-52.txt"
      },
      {
        "title": "Sendmail Inc. Information for VU#784980",
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/AAMN-5RHQ64"
      },
      {
        "title": "M500-012",
        "trust": 0.8,
        "url": "ftp://ftp.foretune.co.jp/pub/BSDOS/patches-5.0/M500-012.ia32"
      },
      {
        "title": "M431-011",
        "trust": 0.8,
        "url": "ftp://ftp.foretune.co.jp/pub/BSDOS/patches-4.3.1/i386/M431-011"
      },
      {
        "title": "RHSA-2003:283",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-283J.html"
      },
      {
        "title": "RHSA-2003:284",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-284J.html"
      },
      {
        "title": "TLSA-2003-52",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2003/TLSA-2003-52j.txt"
      },
      {
        "title": "Debian Security Advisories: DSA-384-1 sendmail -- buffer overflows",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=243b978e3f17d13dd590ac7cfc4a472f"
      },
      {
        "title": "cumes",
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes "
      },
      {
        "title": "x0rzEQGRP",
        "trust": 0.1,
        "url": "https://github.com/happysmack/x0rzEQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Nekkidso/EQGRP "
      },
      {
        "title": "test",
        "trust": 0.1,
        "url": "https://github.com/DevKosov/test "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/hackcrypto/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Ninja-Tw1sT/EQGRP "
      },
      {
        "title": "leaked2",
        "trust": 0.1,
        "url": "https://github.com/kongjiexi/leaked2 "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/391861737/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Muhammd/EQGRP "
      },
      {
        "title": "ShadowBrokersFiles",
        "trust": 0.1,
        "url": "https://github.com/R3K1NG/ShadowBrokersFiles "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/CKmaenn/EQGRP "
      },
      {
        "title": "EQGRP_Linux",
        "trust": 0.1,
        "url": "https://github.com/CybernetiX-S3C/EQGRP_Linux "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/IHA114/EQGRP "
      },
      {
        "title": "ShadowBrokersFiles",
        "trust": 0.1,
        "url": "https://github.com/antiscammerarmy/ShadowBrokersFiles "
      },
      {
        "title": "shadowbrokerstuff",
        "trust": 0.1,
        "url": "https://github.com/thetrentusdev/shadowbrokerstuff "
      },
      {
        "title": "bdhglopoj",
        "trust": 0.1,
        "url": "https://github.com/maxcvnd/bdhglopoj "
      },
      {
        "title": "shadowbrokerstuff",
        "trust": 0.1,
        "url": "https://github.com/shakenetwork/shadowbrokerstuff "
      },
      {
        "title": "x0rz-EQGRP",
        "trust": 0.1,
        "url": "https://github.com/r3p3r/x0rz-EQGRP "
      },
      {
        "title": "ShadowBrokersStuff",
        "trust": 0.1,
        "url": "https://github.com/thetrentus/ShadowBrokersStuff "
      },
      {
        "title": "EQ1",
        "trust": 0.1,
        "url": "https://github.com/thePevertedSpartan/EQ1 "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Badbug6/EQGRP "
      },
      {
        "title": "EQGRP-nasa",
        "trust": 0.1,
        "url": "https://github.com/Soldie/EQGRP-nasa "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Mofty/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/thetrentus/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/NamanGangwar/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/x0rz/EQGRP "
      },
      {
        "title": "SB--.-HACK-the-EQGRP-1",
        "trust": 0.1,
        "url": "https://github.com/cipherreborn/SB--.-HACK-the-EQGRP-1 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.9,
        "url": "http://www.cert.org/advisories/ca-2003-25.html"
      },
      {
        "trust": 2.7,
        "url": "http://www.kb.cert.org/vuls/id/784980"
      },
      {
        "trust": 2.6,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html"
      },
      {
        "trust": 2.6,
        "url": "http://www.sendmail.org/8.12.10.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2003/dsa-384"
      },
      {
        "trust": 1.8,
        "url": "http://www.mandriva.com/security/advisories?name=mdksa-2003:092"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-283.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-284.html"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.11/scosa-2004.11.txt"
      },
      {
        "trust": 1.8,
        "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html"
      },
      {
        "trust": 1.7,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742"
      },
      {
        "trust": 1.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2975"
      },
      {
        "trust": 1.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a572"
      },
      {
        "trust": 1.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a603"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106382859407683\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106381604923204\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2"
      },
      {
        "trust": 0.9,
        "url": "http://www.securityfocus.com/bid/8641"
      },
      {
        "trust": 0.8,
        "url": "http://archives.neohapsis.com/archives/sendmail/2003-q3/0002.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org/patches/parse8.359.2.8"
      },
      {
        "trust": 0.8,
        "url": "http://www.ciac.org/ciac/bulletins/n-149.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0694"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/13204"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr033901.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr034001.txt"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-25"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trca-2003-25"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0694"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030918_190150.html"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106398718909274\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106383437615742\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106382859407683\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106381604923204\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:603"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:572"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2975"
      },
      {
        "trust": 0.3,
        "url": "http://www-1.ibm.com/servers/aix/"
      },
      {
        "trust": 0.3,
        "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000746"
      },
      {
        "trust": 0.3,
        "url": "http://www.sendmail.org/"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56860"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56922"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/qube3.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/patches/linux/security.html"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v4.0g/t64kit0020132-v40gb22-es-20031001.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-553-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-563-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-586-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-594-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/337839"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106383437615742\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106381604923204\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106382859407683\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106398718909274\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000742"
      },
      {
        "trust": 0.1,
        "url": ""
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/./dsa-384"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-17T00:00:00",
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "date": "2003-09-17T00:00:00",
        "db": "BID",
        "id": "8641"
      },
      {
        "date": "2003-09-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "date": "2003-10-06T04:00:00",
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-29T00:00:00",
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "date": "2009-07-11T23:56:00",
        "db": "BID",
        "id": "8641"
      },
      {
        "date": "2006-08-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "date": "2007-08-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sendmail prescan() buffer overflow vulnerability",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      }
    ],
    "trust": 0.9
  }
}

VAR-200310-0080

Vulnerability from variot - Updated: 2025-04-03 22:39

A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences. This vulnerability could allow a remote attacker to execute arbitrary code or cause a denial of service on a vulnerable system.This vulnerability does not affect the default configuration. Note that Sendmail under a default configuration is not vulnerable to this issue

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200310-0080",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.5"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.1"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "advanced server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 1.6,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "1.2"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.22"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "0.7"
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openbsd",
        "version": "3.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.4.3"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "openbsd",
        "version": "3.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.6.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "0.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.4"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.0.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.00"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.1a"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.3"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.9"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.0"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.12.9"
      },
      {
        "model": "cobalt qube3",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raq4",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raq550",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raqxtr",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "linux 5.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "turbolinux advanced server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.1"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.5"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.0"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.00"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.04"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.11"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.23"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "8.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "9"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "tru64 f pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "consortium sendmail beta10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "hp-ux b.11.23",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "tru64 pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.10"
      },
      {
        "model": "nonstop-ux whitney",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.22",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "linux rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "linux rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.23"
      },
      {
        "model": "consortium sendmail beta5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.7"
      },
      {
        "model": "tru64 g pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail beta16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5x86"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "tru64 b pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "hp-ux b.11.04",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "tru64 a pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.8"
      },
      {
        "model": "tru64 g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "nonstop-ux puma",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "beta",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "tru64 f pk7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "tru64 pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 f pk8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "consortium sendmail beta12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "sh3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "altavista firewall avfw98",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "tru64 a pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 b pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.9"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.4"
      },
      {
        "model": "consortium sendmail beta7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "hp-ux b.11.11",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "tru64 a pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux b.11.00",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "alphaserver sc",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "tru64 pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "linux a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "tru64 g pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.9"
      },
      {
        "model": "linux rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "consortium sendmail",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.10"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "altavista firewall raptor ec",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_qube_3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_4",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_550",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_xtr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sun:linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sun:solaris",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_advanced_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_workstation",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:hp-ux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:linux",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Discovery of this vulnerability has been credited to Timo Sirainen.",
    "sources": [
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      }
    ],
    "trust": 0.9
  },
  "cve": "CVE-2003-0681",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2003-0681",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-7506",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2003-0681",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#108964",
            "trust": 0.8,
            "value": "6.33"
          },
          {
            "author": "NVD",
            "id": "CVE-2003-0681",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200310-016",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-7506",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2003-0681",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "A \"potential buffer overflow in ruleset parsing\" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences. This vulnerability could allow a remote attacker to execute arbitrary code or cause a denial of service on a vulnerable system.This vulnerability does not affect the default configuration. Note that Sendmail under a default configuration is not vulnerable to this issue",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      },
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      }
    ],
    "trust": 2.79
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-7506",
        "trust": 0.1,
        "type": "unknown"
      },
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=23154",
        "trust": 0.1,
        "type": "exploit"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2003-0681",
        "trust": 2.9
      },
      {
        "db": "CERT/CC",
        "id": "VU#108964",
        "trust": 2.8
      },
      {
        "db": "BID",
        "id": "8649",
        "trust": 2.3
      },
      {
        "db": "XF",
        "id": "13216",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016",
        "trust": 0.7
      },
      {
        "db": "EXPLOIT-DB",
        "id": "23154",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76930",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "id": "VAR-200310-0080",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T22:39:57.854000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HPSBUX00281",
        "trust": 0.8,
        "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01035741"
      },
      {
        "title": "RHSA-2003:283",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2003-283.html"
      },
      {
        "title": "8.12.10",
        "trust": 0.8,
        "url": "http://www.sendmail.org/8.12.10.html"
      },
      {
        "title": "57573",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57573-1"
      },
      {
        "title": "56922",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-1"
      },
      {
        "title": "57573",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-57573-3"
      },
      {
        "title": "56922",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-3"
      },
      {
        "title": "4 Sendmail Security Update 2.0.2",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "XTR Sendmail Security Update 1.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "550 Sendmail Security Update 0.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "TLSA-2003-52",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2003/TLSA-2003-52.txt"
      },
      {
        "title": "RHSA-2003:283",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-283J.html"
      },
      {
        "title": "TLSA-2003-52",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2003/TLSA-2003-52j.txt"
      },
      {
        "title": "Debian Security Advisories: DSA-384-1 sendmail -- buffer overflows",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=243b978e3f17d13dd590ac7cfc4a472f"
      },
      {
        "title": "x0rzEQGRP",
        "trust": 0.1,
        "url": "https://github.com/happysmack/x0rzEQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Nekkidso/EQGRP "
      },
      {
        "title": "test",
        "trust": 0.1,
        "url": "https://github.com/DevKosov/test "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/hackcrypto/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Ninja-Tw1sT/EQGRP "
      },
      {
        "title": "leaked2",
        "trust": 0.1,
        "url": "https://github.com/kongjiexi/leaked2 "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/391861737/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Muhammd/EQGRP "
      },
      {
        "title": "ShadowBrokersFiles",
        "trust": 0.1,
        "url": "https://github.com/R3K1NG/ShadowBrokersFiles "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/CKmaenn/EQGRP "
      },
      {
        "title": "EQGRP_Linux",
        "trust": 0.1,
        "url": "https://github.com/CybernetiX-S3C/EQGRP_Linux "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/IHA114/EQGRP "
      },
      {
        "title": "ShadowBrokersFiles",
        "trust": 0.1,
        "url": "https://github.com/antiscammerarmy/ShadowBrokersFiles "
      },
      {
        "title": "shadowbrokerstuff",
        "trust": 0.1,
        "url": "https://github.com/thetrentusdev/shadowbrokerstuff "
      },
      {
        "title": "bdhglopoj",
        "trust": 0.1,
        "url": "https://github.com/maxcvnd/bdhglopoj "
      },
      {
        "title": "shadowbrokerstuff",
        "trust": 0.1,
        "url": "https://github.com/shakenetwork/shadowbrokerstuff "
      },
      {
        "title": "x0rz-EQGRP",
        "trust": 0.1,
        "url": "https://github.com/r3p3r/x0rz-EQGRP "
      },
      {
        "title": "ShadowBrokersStuff",
        "trust": 0.1,
        "url": "https://github.com/thetrentus/ShadowBrokersStuff "
      },
      {
        "title": "EQ1",
        "trust": 0.1,
        "url": "https://github.com/thePevertedSpartan/EQ1 "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Badbug6/EQGRP "
      },
      {
        "title": "EQGRP-nasa",
        "trust": 0.1,
        "url": "https://github.com/Soldie/EQGRP-nasa "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Mofty/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/thetrentus/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/NamanGangwar/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/x0rz/EQGRP "
      },
      {
        "title": "SB--.-HACK-the-EQGRP-1",
        "trust": 0.1,
        "url": "https://github.com/cipherreborn/SB--.-HACK-the-EQGRP-1 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.1,
        "url": "http://www.securityfocus.com/bid/8649"
      },
      {
        "trust": 2.0,
        "url": "http://www.kb.cert.org/vuls/id/108964"
      },
      {
        "trust": 1.5,
        "url": "http://www.sendmail.org/8.12.10.html"
      },
      {
        "trust": 1.2,
        "url": "http://www.debian.org/security/2003/dsa-384"
      },
      {
        "trust": 1.2,
        "url": "http://www.mandriva.com/security/advisories?name=mdksa-2003:092"
      },
      {
        "trust": 1.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a3606"
      },
      {
        "trust": 1.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a595"
      },
      {
        "trust": 1.2,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-283.html"
      },
      {
        "trust": 1.2,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13216"
      },
      {
        "trust": 1.1,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.com"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0681"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/13216"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0681"
      },
      {
        "trust": 0.3,
        "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000746"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56922"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/57573"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/qube3.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106383437615742\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106398718909274\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000742"
      },
      {
        "trust": 0.1,
        "url": ""
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.exploit-db.com/exploits/23154/"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/hackcrypto/eqgrp"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/./dsa-384"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-18T00:00:00",
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "date": "2003-09-17T00:00:00",
        "db": "BID",
        "id": "8649"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "date": "2003-10-06T04:00:00",
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-18T00:00:00",
        "db": "CERT/CC",
        "id": "VU#108964"
      },
      {
        "date": "2018-05-03T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7506"
      },
      {
        "date": "2018-05-03T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0681"
      },
      {
        "date": "2007-09-22T00:30:00",
        "db": "BID",
        "id": "8649"
      },
      {
        "date": "2007-08-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000277"
      },
      {
        "date": "2006-08-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2003-0681"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sendmail Ruleset Parsing Buffer Overflow Vulnerability",
    "sources": [
      {
        "db": "BID",
        "id": "8649"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      }
    ],
    "trust": 0.9
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "buffer overflow",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-016"
      }
    ],
    "trust": 0.6
  }
}

VAR-200304-0013

Vulnerability from variot - Updated: 2025-04-03 21:38

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. Sendmail contains a buffer overflow in code that parses email addresses. A remote attacker could execute arbitrary code or cause a denial of service on a vulnerable system. The flaw is present in the 'prescan()' procedure, which is used for processing email addresses in SMTP headers. This vulnerability stems from a logic error in the conversion of a char to an integer value. The issue has been fixed Sendmail 8.12.9. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. Sendmail is one of the most popular MTAs. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\% to 75\% of the total. Many UNIX and Linux workstations run Sendmail by default. This vulnerability exists in the prescan() process. The vulnerability is for messages, not connections. This means that the vulnerability is triggered by the content of a specially crafted email message, rather than by lower-level network communications. This is important because a non-vulnerable MTA can send malicious messages along with other protected MTAs in the network. In other words, even if the software used by the boundary MTA of the site is not sendmail, the sendmail service program with loopholes inside the network is still threatened. Messages that exploit this vulnerability can also pass through many common packet filters or firewalls undetected

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200304-0013",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "10.24"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.01"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.10"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.34"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.0.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.30"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.6"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.26"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.16"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.20"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.5"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.4"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "4.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "9.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk3_bl17"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.00"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0_pk4_bl18"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk4_bl18"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "hp-ux series 700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk5_bl19"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b_pk1_bl1"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.5.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0a"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0d_pk9_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0d"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk7_bl18"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.00"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0b"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.08"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0_pk4_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk2_bl2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk3_bl3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.7"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g_pk3_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk6_bl20"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0a_pk3_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "sis",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.09"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk1_bl1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "hp-ux series 800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "8.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0f"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk6_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "conectiva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mandrakesoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mirapoint",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nortel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sequent ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sendmail consortium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wind river",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wirex",
        "version": null
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.11.6"
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.12.8"
      },
      {
        "model": "cobalt raq4",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raq550",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raqxtr",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "2.6 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "2.6 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "advanced message server",
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.1.x"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.2.x"
      },
      {
        "model": "turbolinux advanced server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.1"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.5"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.0"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.10"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.00"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.11"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.04"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "6.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "8.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "9"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "hp-ux sis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "z/os v1r4",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "os/390 v2r6",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tru64 f pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "consortium sendmail beta10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.2"
      },
      {
        "model": "tru64 pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "mac os",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "nonstop-ux whitney",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.22",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.0"
      },
      {
        "model": "z/os",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "os/390 v2r9",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "solaris x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.9"
      },
      {
        "model": "hp-ux series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20700"
      },
      {
        "model": "advanced workstation for the itanium processor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "z/os v1r2",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "consortium sendmail beta5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.5"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.7"
      },
      {
        "model": "tru64 g pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 d pk9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail beta16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "os/390 v2r8",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "solaris 2.6 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "hp-ux b.11.04",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "aix l",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "solaris 2.4 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "cobalt raq 4100r",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "550"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "tru64 d",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.8"
      },
      {
        "model": "tru64 g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "nonstop-ux puma",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "9"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "tru64 f pk7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "openlinux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "3.1.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "tru64 pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "cobalt qube3 4000wg",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.8"
      },
      {
        "model": "mac os server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "consortium sendmail beta12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "os/390 v2r10",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "altavista firewall avfw98",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "tru64 b pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.9"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "solaris 2.5 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "openlinux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "3.1.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.4"
      },
      {
        "model": "consortium sendmail beta7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "hp-ux b.11.11",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "tru64 a pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux b.11.00",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "solaris 7.0 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "solaris 9 x86 update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2"
      },
      {
        "model": "lx50",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.0"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "alphaserver sc",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "tru64 pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "solaris ppc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "hp-ux series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20800"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "mvs",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "cobalt raq4 3001r",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "cobalt raq xtr 3500r",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "altavista firewall raptor ec",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:ibm:aix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_4",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_550",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_xtr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sun:solaris",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_advanced_message_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_advanced_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_workstation",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:hp-ux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:vvos",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:linux",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michal Zalewski\u203b lcamtuf@dione.ids.pl",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2003-0161",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2003-0161",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-6991",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2003-0161",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#897604",
            "trust": 0.8,
            "value": "67.20"
          },
          {
            "author": "NVD",
            "id": "CVE-2003-0161",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200304-025",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-6991",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2003-0161",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. Sendmail contains a buffer overflow in code that parses email addresses.  A remote attacker could execute arbitrary code or cause a denial of service on a vulnerable system. The flaw is present in the \u0027prescan()\u0027 procedure, which is used for processing email addresses in SMTP headers.  This vulnerability stems from a logic error in the conversion of a char to an integer value. The issue has been fixed Sendmail 8.12.9. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. Sendmail is one of the most popular MTAs. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\\\\% to 75\\\\% of the total. Many UNIX and Linux workstations run Sendmail by default. This vulnerability exists in the prescan() process. The vulnerability is for messages, not connections. This means that the vulnerability is triggered by the content of a specially crafted email message, rather than by lower-level network communications. This is important because a non-vulnerable MTA can send malicious messages along with other protected MTAs in the network. In other words, even if the software used by the boundary MTA of the site is not sendmail, the sendmail service program with loopholes inside the network is still threatened. Messages that exploit this vulnerability can also pass through many common packet filters or firewalls undetected",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      },
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      }
    ],
    "trust": 2.79
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=24",
        "trust": 0.2,
        "type": "exploit"
      },
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-6991",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#897604",
        "trust": 3.7
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "7230",
        "trust": 2.9
      },
      {
        "db": "XF",
        "id": "11653",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025",
        "trust": 0.7
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:121",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:120",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-278",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-290",
        "trust": 0.6
      },
      {
        "db": "SCO",
        "id": "SCOSA-2004.11",
        "trust": 0.6
      },
      {
        "db": "IMMUNIX",
        "id": "IMNX-2003-7+-002-01",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "52620",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "52700",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "1001088",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030329 SENDMAIL 8.12.9 AVAILABLE",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030520 [FWD: 127 RESEARCH AND DEVELOPMENT: 127 DAY!]",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030331 GLSA: SENDMAIL (200303-27)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030329 SENDMAIL: -1 GONE WILD",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030330 [OPENPKG-SA-2003.027] OPENPKG SECURITY ADVISORY (SENDMAIL)",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20030329 SENDMAIL: -1 GONE WILD",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2003-12",
        "trust": 0.6
      },
      {
        "db": "CONECTIVA",
        "id": "CLA-2003:614",
        "trust": 0.6
      },
      {
        "db": "SGI",
        "id": "20030401-01-P",
        "trust": 0.6
      },
      {
        "db": "CALDERA",
        "id": "CSSA-2003-016.0",
        "trust": 0.6
      },
      {
        "db": "GENTOO",
        "id": "GLSA-200303-27",
        "trust": 0.6
      },
      {
        "db": "FREEBSD",
        "id": "FREEBSD-SA-03:07",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "24",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-15232",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-62723",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76244",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "22442",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "id": "VAR-200304-0013",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T21:38:17.829000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HPSBUX00253",
        "trust": 0.8,
        "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00958571"
      },
      {
        "title": "HPSBUX0304-253",
        "trust": 0.8,
        "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX0304-253.html"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.ibm.com/jp/"
      },
      {
        "title": "RHSA-2003:120",
        "trust": 0.8,
        "url": "http://rhn.redhat.com/errata/RHSA-2003-120.html"
      },
      {
        "title": "sendmail 8.12.9 available",
        "trust": 0.8,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "title": "52620",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
      },
      {
        "title": "52700",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
      },
      {
        "title": "52700",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-3"
      },
      {
        "title": "52620",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-3"
      },
      {
        "title": "4 Sendmail Security Update 2.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "XTR Sendmail Security Update 1.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "550 Sendmail Security Update 0.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "TLSA-2003-24",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2003/TLSA-2003-24.txt"
      },
      {
        "title": "Sendmail Inc. Information for VU#897604",
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/AAMN-5KUUTZ"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.sendmail.co.jp/"
      },
      {
        "title": "RHSA-2003:120",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-120J.html"
      },
      {
        "title": "TLSA-2003-24",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2003/TLSA-2003-24j.txt"
      },
      {
        "title": "Debian Security Advisories: DSA-290-1 sendmail-wide -- char-to-int conversion",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=8086c3d7d3014252ce37b8626383010c"
      },
      {
        "title": "cumes",
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://www.kb.cert.org/vuls/id/897604"
      },
      {
        "trust": 2.7,
        "url": "http://www.securityfocus.com/bid/7230"
      },
      {
        "trust": 2.6,
        "url": "http://www.cert.org/advisories/ca-2003-12.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/archive/1/321997"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.caldera.com/pub/security/openlinux/cssa-2003-016.0.txt"
      },
      {
        "trust": 1.8,
        "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2003/dsa-278"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2003/dsa-290"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.freebsd.org/pub/freebsd/cert/advisories/freebsd-sa-03:07.sendmail.asc"
      },
      {
        "trust": 1.8,
        "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-march/004295.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-120.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-121.html"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.11/scosa-2004.11.txt"
      },
      {
        "trust": 1.8,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-p"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
      },
      {
        "trust": 1.7,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/archive/1/317135/30/25220/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/archive/1/316773/2003-03-28/2003-04-03/0"
      },
      {
        "trust": 0.8,
        "url": "http://www.iss.net/issen/delivery/xforce/alertdetail.jsp?oid=22127"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org/secure-install.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org/ftp/release_notes"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc2047.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.ciac.org/ciac/bulletins/n-067.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0161"
      },
      {
        "trust": 0.8,
        "url": "http://www.ipa.go.jp/security/ciadr/20030331sendmail.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031401.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031501.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031301.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/at/2003/at030004.txt"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-12"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-07/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0161"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/11653"
      },
      {
        "trust": 0.8,
        "url": "http://www.isskk.co.jp/support/techinfo/general/sendmail033103_xforce.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030330_153031.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030506_122656.html"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104897487512238\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/316961/30/25250/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104914999806315\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f52620"
      },
      {
        "trust": 0.3,
        "url": "http://www.info.apple.com/usen/security/security_updates.html"
      },
      {
        "trust": 0.3,
        "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/mss/mss-oar-e01-2003.0793.1"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://rhn.redhat.com/errata/rhsa-2003-121.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.sendmail.org/"
      },
      {
        "trust": 0.3,
        "url": "http://www.sotlinux.org/en/sotlinux/sa/2003/2003-0019.php"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v4.0f/duv40fb18-c0093400-17811-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1a/t64v51ab21-c0112900-17770-es-20030402.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1b/t64v51bb1-c0008000-17812-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51b20-c0176700-17773-es-20030402.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v4.0g/t64v40gb17-c0029200-17810-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f52700\u0026zone_32=category%3asecurity"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/321997"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/316760"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104897487512238\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104896621106790\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104914999806315\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000614"
      },
      {
        "trust": 0.1,
        "url": ""
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/./dsa-290"
      },
      {
        "trust": 0.1,
        "url": "https://www.exploit-db.com/exploits/24/"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-03-29T00:00:00",
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "date": "2003-04-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "date": "2003-04-02T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "date": "2003-03-29T00:00:00",
        "db": "BID",
        "id": "7230"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "date": "2003-03-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "date": "2003-04-02T05:00:00",
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-25T00:00:00",
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "date": "2007-09-21T23:40:00",
        "db": "BID",
        "id": "7230"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "date": "2010-02-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sendmail address parsing buffer overflow",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.9
  }
}

VAR-200303-0122

Vulnerability from variot - Updated: 2025-04-03 20:39

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. sendmail A buffer overflow vulnerability was discovered in message processing. The vulnerability could allow a third party to gain administrative privileges remotely. This problem, sendmail is caused by receiving a message with maliciously constructed header information. For this reason, LAN is running on a host installed within sendmail Even other MTA (Mail Transfer Agent) You may be affected by the vulnerability if you receive a malicious message relayed from .A third party may be able to remotely obtain administrator privileges. Sendmail is prone to a remotely buffer-overflow vulnerability in the SMTP header parsing component. Successful attackers may exploit this vulnerability to gain control of affected servers. Reportedly, this vulnerability may be locally exploitable if the sendmail binary is setuid/setgid. Sendmail 5.2 to 8.12.7 are affected. Administrators are advised to upgrade to 8.12.8 or to apply patches to earlier versions of the 8.12.x tree. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\% to 75\% of the total. Many UNIX and Linux workstations run Sendmail by default. When an email header contains an address or address list (eg \"From\", \"To\", \"CC\"), Sendmail will attempt to check whether the provided address or address list is valid. Sendmail does this using the crackaddr() function, which is located in the headers.c file in the Sendmail source tree. Sendmail will check this buffer and stop adding data to it if it is found to be full. Sendmail goes through several safety checks to ensure that characters are interpreted correctly. On most Unix or Linux systems, Sendmail runs as the root user. Because the attack code can be included in what appears to be a normal email message, it can easily penetrate many common packet filtering devices or firewalls without being detected. Successful exploitation of an unpatched sendmail system leaves no messages in the syslog. However, on patched systems, attempts to exploit this vulnerability leave the following log message: Dropped invalid comments from header address This vulnerability affects both the commercial and open source versions of Sendmail, and is also reported to have been tested in the lab environment has been successfully exploited

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200303-0122",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.10"
      },
      {
        "model": "sendmail",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "sendmail",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.0.4"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.8"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "platform sa",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "1.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "8"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.7"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.00"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "bsdos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "4.2"
      },
      {
        "model": "alphaserver sc",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "2.6"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "7.0"
      },
      {
        "model": "sendmail",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "oracle",
        "version": "9"
      },
      {
        "model": "sendmail",
        "scope": "gte",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "sendmail",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "bsdos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "4.3.1"
      },
      {
        "model": "bsdos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "windriver",
        "version": "5.0"
      },
      {
        "model": "alphaserver sc",
        "scope": null,
        "trust": 0.9,
        "vendor": "hp",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "bsd os",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "conectiva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mandrakesoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nortel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sco group sco linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sco group sco unixware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sendmail consortium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "xerox",
        "version": null
      },
      {
        "model": "bsd/os",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30d5\u30a9\u30a2 \u30c1\u30e5\u30fc\u30f3",
        "version": null
      },
      {
        "model": "ux4800\u30b7\u30ea\u30fc\u30ba",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u672c\u96fb\u6c17",
        "version": null
      },
      {
        "model": "sendmail",
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "sun cobalt qube3",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "systemwalker perfmgr",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "teamware office",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "sun cobalt raq3",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "sendmail switch",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bb\u30f3\u30c9\u30e1\u30fc\u30eb\u793e",
        "version": null
      },
      {
        "model": "up-ux",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u672c\u96fb\u6c17",
        "version": null
      },
      {
        "model": "sun cobalt raq4",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "interstage collaborationring pm",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "irix",
        "scope": null,
        "trust": 0.8,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": "netbsd",
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": "sun linux 5.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "turbolinux workstation",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9",
        "version": null
      },
      {
        "model": "unixware",
        "scope": null,
        "trust": 0.8,
        "vendor": "sco",
        "version": null
      },
      {
        "model": "interstage collaborationring tpm",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "sendmail pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bb\u30f3\u30c9\u30e1\u30fc\u30eb\u793e",
        "version": null
      },
      {
        "model": "sendmail for nt",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bb\u30f3\u30c9\u30e1\u30fc\u30eb\u793e",
        "version": null
      },
      {
        "model": "turbolinux advanced server",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9",
        "version": null
      },
      {
        "model": "systemwalker it budgetmgr",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "apple mac os x",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30a2\u30c3\u30d7\u30eb",
        "version": null
      },
      {
        "model": "aix",
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "hi-ux/we2",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u7acb",
        "version": null
      },
      {
        "model": "open unix",
        "scope": null,
        "trust": 0.8,
        "vendor": "sco",
        "version": null
      },
      {
        "model": "trendmicro interscan viruswall",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30c8\u30ec\u30f3\u30c9\u30de\u30a4\u30af\u30ed",
        "version": null
      },
      {
        "model": "sun cobalt raq550",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "internet navigware server",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "openlinux",
        "scope": null,
        "trust": 0.8,
        "vendor": "sco",
        "version": null
      },
      {
        "model": "hp-ux",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30d2\u30e5\u30fc\u30ec\u30c3\u30c8 \u30d1\u30c3\u30ab\u30fc\u30c9",
        "version": null
      },
      {
        "model": "interstage office square",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u5bcc\u58eb\u901a",
        "version": null
      },
      {
        "model": "red hat enterprise linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "sun solaris",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "red hat linux advanced workstation",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "turbolinux server",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30bf\u30fc\u30dc\u30ea\u30ca\u30c3\u30af\u30b9",
        "version": null
      },
      {
        "model": "sun cobalt raqxtr",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30b5\u30f3 \u30de\u30a4\u30af\u30ed\u30b7\u30b9\u30c6\u30e0\u30ba",
        "version": null
      },
      {
        "model": "red hat linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u30ec\u30c3\u30c9\u30cf\u30c3\u30c8",
        "version": null
      },
      {
        "model": "ews-ux",
        "scope": null,
        "trust": 0.8,
        "vendor": "\u65e5\u672c\u96fb\u6c17",
        "version": null
      },
      {
        "model": "freebsd",
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "river systems platform sa",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wind",
        "version": "1.0"
      },
      {
        "model": "river systems bsd/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wind",
        "version": "5.0"
      },
      {
        "model": "river systems bsd/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wind",
        "version": "4.3.1"
      },
      {
        "model": "river systems bsd/os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "wind",
        "version": "4.2"
      },
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "9"
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 7.0 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "solaris 2.6 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.6"
      },
      {
        "model": "lx50",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "cobalt raq xtr",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "550"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3"
      },
      {
        "model": "cobalt qube",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "3"
      },
      {
        "model": "cobalt manageraq3 3000r-mr",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "cobalt cacheraq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5"
      },
      {
        "model": "freeware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "1.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "consortium sendmail beta7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "5.65"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "5.61"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "5.59"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "7.1.3"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "7.1.1"
      },
      {
        "model": "open unix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "8.0"
      },
      {
        "model": "z/os v1r4",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "z/os v1r2",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "os/390 v2r8",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "os/390 v2r10",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "mvs",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "hp-ux b.11.22",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.11",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.04",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.00",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "linux rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "inc sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "consortium sendmail switch",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail for nt",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "gnu/*/linux",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "openwall",
        "version": "1.0"
      },
      {
        "model": "networks junos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5.1"
      },
      {
        "model": "networks junos",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "juniper",
        "version": "5.0"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ISS X-Force\u203b xforce@iss.net",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2002-1337",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2002-1337",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-5722",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2002-1337",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#398025",
            "trust": 0.8,
            "value": "66.00"
          },
          {
            "author": "NVD",
            "id": "CVE-2002-1337",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200303-038",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-5722",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. sendmail A buffer overflow vulnerability was discovered in message processing. The vulnerability could allow a third party to gain administrative privileges remotely. This problem, sendmail is caused by receiving a message with maliciously constructed header information. For this reason, LAN is running on a host installed within sendmail Even other MTA (Mail Transfer Agent) You may be affected by the vulnerability if you receive a malicious message relayed from .A third party may be able to remotely obtain administrator privileges. Sendmail is prone to a remotely buffer-overflow vulnerability in the SMTP header parsing component.  Successful attackers may exploit this vulnerability to gain control of affected servers. \nReportedly, this vulnerability may be locally exploitable if the sendmail binary is setuid/setgid. \nSendmail 5.2 to 8.12.7 are affected. Administrators are advised to upgrade to 8.12.8 or to apply patches to earlier versions of the 8.12.x tree. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\\\\% to 75\\\\% of the total. Many UNIX and Linux workstations run Sendmail by default. When an email header contains an address or address list (eg \\\"From\\\", \\\"To\\\", \\\"CC\\\"), Sendmail will attempt to check whether the provided address or address list is valid. Sendmail does this using the crackaddr() function, which is located in the headers.c file in the Sendmail source tree. Sendmail will check this buffer and stop adding data to it if it is found to be full. Sendmail goes through several safety checks to ensure that characters are interpreted correctly. On most Unix or Linux systems, Sendmail runs as the root user. Because the attack code can be included in what appears to be a normal email message, it can easily penetrate many common packet filtering devices or firewalls without being detected. Successful exploitation of an unpatched sendmail system leaves no messages in the syslog. However, on patched systems, attempts to exploit this vulnerability leave the following log message: Dropped invalid comments from header address This vulnerability affects both the commercial and open source versions of Sendmail, and is also reported to have been tested in the lab environment has been successfully exploited",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      },
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      }
    ],
    "trust": 2.7
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-5722",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2002-1337",
        "trust": 3.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#398025",
        "trust": 3.3
      },
      {
        "db": "BID",
        "id": "6991",
        "trust": 2.8
      },
      {
        "db": "XF",
        "id": "10748",
        "trust": 1.4
      },
      {
        "db": "XF",
        "id": "11653",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038",
        "trust": 0.7
      },
      {
        "db": "CALDERA",
        "id": "CSSA-2003-SCO.5",
        "trust": 0.6
      },
      {
        "db": "CALDERA",
        "id": "CSSA-2003-SCO.6",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:074",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:073",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:227",
        "trust": 0.6
      },
      {
        "db": "HP",
        "id": "HPSBUX0302-246",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030303 FWD: APPLE-SA-2003-03-03 SENDMAIL",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030304 [LSD] TECHNICAL ANALYSIS OF THE REMOTE SENDMAIL VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030304 GLSA: SENDMAIL (200303-4)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030303 SENDMAIL 8.12.8 AVAILABLE",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2003-07",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:2222",
        "trust": 0.6
      },
      {
        "db": "AIXAPAR",
        "id": "IY40500",
        "trust": 0.6
      },
      {
        "db": "AIXAPAR",
        "id": "IY40502",
        "trust": 0.6
      },
      {
        "db": "AIXAPAR",
        "id": "IY40501",
        "trust": 0.6
      },
      {
        "db": "CONECTIVA",
        "id": "CLA-2003:571",
        "trust": 0.6
      },
      {
        "db": "MANDRAKE",
        "id": "MDKSA-2003:028",
        "trust": 0.6
      },
      {
        "db": "SGI",
        "id": "20030301-01-P",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-257",
        "trust": 0.6
      },
      {
        "db": "ISS",
        "id": "20030303 REMOTE SENDMAIL HEADER PROCESSING VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "NETBSD",
        "id": "NETBSD-SA2003-002",
        "trust": 0.6
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76118",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76119",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "22314",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "22313",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "411",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "id": "VAR-200303-0122",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      }
    ],
    "trust": 0.421969685
  },
  "last_update_date": "2025-04-03T20:39:21.067000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HS03-001 Fujitsu CERT\u00a0Advisory information",
        "trust": 0.8,
        "url": "http://www.debian.org/security/2003/dsa-257"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-120",
        "trust": 1.0
      },
      {
        "problemtype": "Classic buffer overflow (CWE-120) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.3,
        "url": "http://www.iss.net/issen/delivery/xforce/alertdetail.jsp?oid=21950"
      },
      {
        "trust": 2.8,
        "url": "http://www.sendmail.org/8.12.8.html"
      },
      {
        "trust": 2.8,
        "url": "http://www.cert.org/advisories/ca-2003-07.html"
      },
      {
        "trust": 2.5,
        "url": "http://www.securityfocus.com/bid/6991"
      },
      {
        "trust": 2.5,
        "url": "http://www.kb.cert.org/vuls/id/398025"
      },
      {
        "trust": 1.7,
        "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=iy40500\u0026apar=only"
      },
      {
        "trust": 1.7,
        "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=iy40501\u0026apar=only"
      },
      {
        "trust": 1.7,
        "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=iy40502\u0026apar=only"
      },
      {
        "trust": 1.7,
        "url": "ftp://ftp.sco.com/pub/updates/unixware/cssa-2003-sco.5"
      },
      {
        "trust": 1.7,
        "url": "ftp://ftp.sco.com/pub/updates/openserver/cssa-2003-sco.6"
      },
      {
        "trust": 1.7,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000571"
      },
      {
        "trust": 1.7,
        "url": "http://www.debian.org/security/2003/dsa-257"
      },
      {
        "trust": 1.7,
        "url": "http://frontal2.mandriva.com/security/advisories?name=mdksa-2003:028"
      },
      {
        "trust": 1.7,
        "url": "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2003-002.txt.asc"
      },
      {
        "trust": 1.7,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-073.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-074.html"
      },
      {
        "trust": 1.7,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-227.html"
      },
      {
        "trust": 1.7,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-p"
      },
      {
        "trust": 1.7,
        "url": "http://www.iss.net/security_center/static/10748.php"
      },
      {
        "trust": 1.1,
        "url": "http://www.sendmail.org"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104678862109841\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104673778105192\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104678862409849\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104678739608479\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104679411316818\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2222"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.com/security/"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.org/archive/1/313757/2003-03-01/2003-03-07/0"
      },
      {
        "trust": 0.8,
        "url": "http://www.nipc.gov/warnings/advisories/2003/03-004.htm"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-07"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2002-1337"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/at/2003/at030002.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031001.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030314_190827.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030305_170302.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.ipa.go.jp/security/ciadr/20030303sendmail.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.ciac.org/ciac/bulletins/n-048.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://www.isskk.co.jp/support/techinfo/general/sendmailheader_xforce.html"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/10748"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/11653"
      },
      {
        "trust": 0.6,
        "url": "http://ftp.support.compaq.com/patches/public/readmes/unix/t64v51ab21-c0103500-17099-es-20030226.readme"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104679411316818\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104678862409849\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104678862109841\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104678739608479\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104673778105192\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2222"
      },
      {
        "trust": 0.3,
        "url": "http://www.info.apple.com/usen/security/security_updates.html"
      },
      {
        "trust": 0.3,
        "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/mss/mss-oar-e01-2003.0794.1"
      },
      {
        "trust": 0.3,
        "url": "http://www.slackware.org/lists/archive/viewer.php?l=slackware-security\u0026y=2003\u0026m=slackware-security.286398"
      },
      {
        "trust": 0.3,
        "url": "http://www.sendmail.org/"
      },
      {
        "trust": 0.3,
        "url": "ftp://ftp1.support.compaq.com/public/unix/v4.0g/t64v40gb17-c0028100-16887-es-20030211.readme"
      },
      {
        "trust": 0.3,
        "url": "ftp://ftp1.support.compaq.com/public/unix/v4.0f/duv40fb18-c0092200-16888-es-20030211.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp1.support.compaq.com/public/unix/v5.0a/t64v50ab17-c0031300-16884-es-20030211.readme"
      },
      {
        "trust": 0.3,
        "url": "ftp://ftp1.support.compaq.com/public/unix/v5.1/t64v51b19-c0169100-16882-es-20030211.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/readmes/unix/t64v51bb1-c0003900-16874-es-20030211.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/readmes/unix/t64v51b20-c0169800-16980-es-20030218.readme"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert/51181"
      },
      {
        "trust": 0.3,
        "url": "http://www.sendmail.com"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/313757"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/313795"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/313841"
      },
      {
        "trust": 0.1,
        "url": ""
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-03-03T00:00:00",
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "date": "2003-03-07T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "date": "2003-03-02T00:00:00",
        "db": "BID",
        "id": "6991"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "date": "2003-03-07T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "date": "2003-03-07T05:00:00",
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-15T00:00:00",
        "db": "CERT/CC",
        "id": "VU#398025"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-5722"
      },
      {
        "date": "2007-09-22T00:30:00",
        "db": "BID",
        "id": "6991"
      },
      {
        "date": "2024-03-01T01:52:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000061"
      },
      {
        "date": "2006-08-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2002-1337"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Remote Buffer Overflow in Sendmail",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#398025"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "6991"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200303-038"
      }
    ],
    "trust": 0.9
  }
}

VAR-202107-1672

Vulnerability from variot - Updated: 2024-11-23 20:00

ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer. F5 Networks of nginx Products from other vendors contain vulnerabilities related to certificate validation.Information may be obtained and information may be tampered with. (CVE-2020-11724). ========================================================================== Ubuntu Security Notice USN-5371-2 April 28, 2022

nginx vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 22.04 LTS

Summary:

nginx could be made to redirect network traffic.

Software Description: - nginx: small, powerful, scalable web/proxy server

Details:

USN-5371-1 fixed several vulnerabilities in nginx. This update provides the fix for CVE-2021-3618 for Ubuntu 22.04 LTS.

Original advisory details:

It was discovered that nginx Lua module mishandled certain inputs. An attacker could possibly use this issue to perform an HTTP Request Smuggling attack. This issue only affects Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-11724)

It was discovered that nginx Lua module mishandled certain inputs. An attacker could possibly use this issue to disclose sensitive information. This issue only affects Ubuntu 18.04 LTS and Ubuntu 20.04 LTS. (CVE-2020-36309)

It was discovered that nginx mishandled the use of compatible certificates among multiple encryption protocols. (CVE-2021-3618)

Update instructions:

The problem can be corrected by updating your system to the following package versions:

Ubuntu 22.04 LTS: nginx-core 1.18.0-6ubuntu14.1 nginx-extras 1.18.0-6ubuntu14.1 nginx-light 1.18.0-6ubuntu14.1

In general, a standard system update will make all the necessary changes.

References: https://ubuntu.com/security/notices/USN-5371-2 https://ubuntu.com/security/notices/USN-5371-1 CVE-2021-3618

Package Information: https://launchpad.net/ubuntu/+source/nginx/1.18.0-6ubuntu14.1

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-202107-1672",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "nginx",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "f5",
        "version": "1.21.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "debian",
        "version": "10.0"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "33"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "35"
      },
      {
        "model": "sendmail",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.17"
      },
      {
        "model": "vsftpd",
        "scope": "lt",
        "trust": 1.0,
        "vendor": "vsftpd",
        "version": "3.0.4"
      },
      {
        "model": "fedora",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "fedoraproject",
        "version": "34"
      },
      {
        "model": "vsftpd",
        "scope": null,
        "trust": 0.8,
        "vendor": "vsftpd",
        "version": null
      },
      {
        "model": "nginx",
        "scope": null,
        "trust": 0.8,
        "vendor": "f5",
        "version": null
      },
      {
        "model": "fedora",
        "scope": null,
        "trust": 0.8,
        "vendor": "fedora",
        "version": null
      },
      {
        "model": "gnu/linux",
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": "sendmail",
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Ubuntu",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      }
    ],
    "trust": 0.4
  },
  "cve": "CVE-2021-3618",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "CVE-2021-3618",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 1.9,
            "vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:N",
            "version": "2.0"
          },
          {
            "accessComplexity": "MEDIUM",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "NONE",
            "baseScore": 5.8,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 8.6,
            "id": "VHN-395783",
            "impactScore": 4.9,
            "integrityImpact": "PARTIAL",
            "severity": "MEDIUM",
            "trust": 0.1,
            "vectorString": "AV:N/AC:M/AU:N/C:P/I:P/A:N",
            "version": "2.0"
          }
        ],
        "cvssV3": [
          {
            "attackComplexity": "HIGH",
            "attackVector": "NETWORK",
            "author": "nvd@nist.gov",
            "availabilityImpact": "NONE",
            "baseScore": 7.4,
            "baseSeverity": "HIGH",
            "confidentialityImpact": "HIGH",
            "exploitabilityScore": 2.2,
            "id": "CVE-2021-3618",
            "impactScore": 5.2,
            "integrityImpact": "HIGH",
            "privilegesRequired": "NONE",
            "scope": "UNCHANGED",
            "trust": 1.0,
            "userInteraction": "NONE",
            "vectorString": "CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.1"
          },
          {
            "attackComplexity": "High",
            "attackVector": "Network",
            "author": "NVD",
            "availabilityImpact": "None",
            "baseScore": 7.4,
            "baseSeverity": "High",
            "confidentialityImpact": "High",
            "exploitabilityScore": null,
            "id": "CVE-2021-3618",
            "impactScore": null,
            "integrityImpact": "High",
            "privilegesRequired": "None",
            "scope": "Unchanged",
            "trust": 0.8,
            "userInteraction": "None",
            "vectorString": "CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:H/A:N",
            "version": "3.0"
          }
        ],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2021-3618",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "NVD",
            "id": "CVE-2021-3618",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-202107-216",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-395783",
            "trust": 0.1,
            "value": "MEDIUM"
          },
          {
            "author": "VULMON",
            "id": "CVE-2021-3618",
            "trust": 0.1,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim\u0027s traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer. F5 Networks of nginx Products from other vendors contain vulnerabilities related to certificate validation.Information may be obtained and information may be tampered with. (CVE-2020-11724). ==========================================================================\nUbuntu Security Notice USN-5371-2\nApril 28, 2022\n\nnginx vulnerability\n==========================================================================\n\nA security issue affects these releases of Ubuntu and its derivatives:\n\n- Ubuntu 22.04 LTS\n\nSummary:\n\nnginx could be made to redirect network traffic. \n\nSoftware Description:\n- nginx: small, powerful, scalable web/proxy server\n\nDetails:\n\nUSN-5371-1 fixed several vulnerabilities in nginx. \nThis update provides the fix for CVE-2021-3618 for Ubuntu 22.04 LTS. \n\nOriginal advisory details:\n\n  It was discovered that nginx Lua module mishandled certain inputs. \n  An attacker could possibly use this issue to perform an HTTP Request\n  Smuggling attack. This issue only affects Ubuntu 18.04 LTS and\n  Ubuntu 20.04 LTS. (CVE-2020-11724)\n\n  It was discovered that nginx Lua module mishandled certain inputs. \n  An attacker could possibly use this issue to disclose sensitive\n  information. This issue only affects Ubuntu 18.04 LTS and\n  Ubuntu 20.04 LTS. (CVE-2020-36309)\n\n  It was discovered that nginx mishandled the use of\n  compatible certificates among multiple encryption protocols. \n  (CVE-2021-3618)\n\nUpdate instructions:\n\nThe problem can be corrected by updating your system to the following\npackage versions:\n\nUbuntu 22.04 LTS:\n   nginx-core                      1.18.0-6ubuntu14.1\n   nginx-extras                    1.18.0-6ubuntu14.1\n   nginx-light                     1.18.0-6ubuntu14.1\n\nIn general, a standard system update will make all the necessary changes. \n\nReferences:\n   https://ubuntu.com/security/notices/USN-5371-2\n   https://ubuntu.com/security/notices/USN-5371-1\n   CVE-2021-3618\n\nPackage Information:\n   https://launchpad.net/ubuntu/+source/nginx/1.18.0-6ubuntu14.1\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      }
    ],
    "trust": 2.16
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2021-3618",
        "trust": 3.8
      },
      {
        "db": "PACKETSTORM",
        "id": "168672",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676",
        "trust": 0.8
      },
      {
        "db": "PACKETSTORM",
        "id": "166709",
        "trust": 0.7
      },
      {
        "db": "PACKETSTORM",
        "id": "166888",
        "trust": 0.7
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.6109",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.1628",
        "trust": 0.6
      },
      {
        "db": "AUSCERT",
        "id": "ESB-2022.6139",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022042817",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022010906",
        "trust": 0.6
      },
      {
        "db": "CS-HELP",
        "id": "SB2022041422",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-395783",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618",
        "trust": 0.1
      },
      {
        "db": "PACKETSTORM",
        "id": "174729",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "id": "VAR-202107-1672",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-23T20:00:55.051000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "Top\u00a0Page",
        "trust": 0.8,
        "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
      },
      {
        "title": "nginx Security vulnerabilities",
        "trust": 0.6,
        "url": "http://123.124.177.30/web/xxk/bdxqById.tag?id=155955"
      },
      {
        "title": "Ubuntu Security Notice: USN-5371-3: nginx vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5371-3"
      },
      {
        "title": "Debian CVElist Bug Report Logs: nginx: CVE-2021-3618",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs\u0026qid=ef1074892d0995f0a511641c443018df"
      },
      {
        "title": "Ubuntu Security Notice: USN-5371-2: nginx vulnerability",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5371-2"
      },
      {
        "title": "Ubuntu Security Notice: USN-5371-1: nginx vulnerabilities",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice\u0026qid=USN-5371-1"
      },
      {
        "title": "Amazon Linux 2: ALASNGINX1-2023-002",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2\u0026qid=ALASNGINX1-2023-002"
      },
      {
        "title": "Red Hat: CVE-2021-3618",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database\u0026qid=CVE-2021-3618"
      },
      {
        "title": "Arch Linux Issues: ",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=arch_linux_issues\u0026qid=CVE-2021-3618 log"
      },
      {
        "title": "Amazon Linux 2022: ALAS2022-2022-172",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=ALAS2022-2022-172"
      },
      {
        "title": "Amazon Linux 2022: ALAS2022-2022-132",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=ALAS2022-2022-132"
      },
      {
        "title": "Amazon Linux 2022: ALAS2022-2022-171",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=ALAS2022-2022-171"
      },
      {
        "title": "Amazon Linux 2022: ALAS2022-2022-136",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=amazon_linux2022\u0026qid=ALAS2022-2022-136"
      },
      {
        "title": "",
        "trust": 0.1,
        "url": "https://github.com/Live-Hack-CVE/CVE-2021-3618 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-295",
        "trust": 1.1
      },
      {
        "problemtype": "Illegal certificate verification (CWE-295) [NVD evaluation ]",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 2.6,
        "url": "https://alpaca-attack.com/"
      },
      {
        "trust": 1.8,
        "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623"
      },
      {
        "trust": 1.8,
        "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
      },
      {
        "trust": 1.2,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2021-3618"
      },
      {
        "trust": 0.6,
        "url": "https://ubuntu.com/security/cve-2021-3618"
      },
      {
        "trust": 0.6,
        "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991329"
      },
      {
        "trust": 0.6,
        "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991328"
      },
      {
        "trust": 0.6,
        "url": "https://github.com/nginx/nginx/commit/173f16f736c10eae46cd15dd861b04b82d91a37a"
      },
      {
        "trust": 0.6,
        "url": "https://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991331"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022010906"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6489853"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022041422"
      },
      {
        "trust": 0.6,
        "url": "https://vigilance.fr/vulnerability/nginx-man-in-the-middle-via-the-tls-extension-alpn-35818"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/168672/ubuntu-security-notice-usn-5371-3.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.ibm.com/support/pages/node/6514817"
      },
      {
        "trust": 0.6,
        "url": "https://cxsecurity.com/cveshow/cve-2021-3618/"
      },
      {
        "trust": 0.6,
        "url": "https://www.cybersecurity-help.cz/vdb/sb2022042817"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166709/ubuntu-security-notice-usn-5371-1.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.1628"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.6109"
      },
      {
        "trust": 0.6,
        "url": "https://packetstormsecurity.com/files/166888/ubuntu-security-notice-usn-5371-2.html"
      },
      {
        "trust": 0.6,
        "url": "https://www.auscert.org.au/bulletins/esb-2022.6139"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-36309"
      },
      {
        "trust": 0.3,
        "url": "https://nvd.nist.gov/vuln/detail/cve-2020-11724"
      },
      {
        "trust": 0.3,
        "url": "https://ubuntu.com/security/notices/usn-5371-1"
      },
      {
        "trust": 0.2,
        "url": "https://ubuntu.com/security/notices/usn-5371-3"
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/295.html"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/live-hack-cve/cve-2021-3618"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/nginx/1.18.0-0ubuntu1.3"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/nginx/1.18.0-6ubuntu11.1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/nginx/1.14.0-0ubuntu1.10"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/nginx/1.18.0-6ubuntu14.1"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-5371-2"
      },
      {
        "trust": 0.1,
        "url": "https://ubuntu.com/security/notices/usn-6379-1"
      },
      {
        "trust": 0.1,
        "url": "https://launchpad.net/ubuntu/+source/vsftpd/3.0.5-0ubuntu0.20.04.1"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2022-03-23T00:00:00",
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "date": "2022-03-23T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "date": "2023-08-10T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "date": "2022-04-13T15:03:13",
        "db": "PACKETSTORM",
        "id": "166709"
      },
      {
        "date": "2022-10-10T16:13:35",
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "date": "2022-04-28T15:18:16",
        "db": "PACKETSTORM",
        "id": "166888"
      },
      {
        "date": "2023-09-19T15:23:43",
        "db": "PACKETSTORM",
        "id": "174729"
      },
      {
        "date": "2021-07-05T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "date": "2022-03-23T20:15:09.833000",
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2023-02-09T00:00:00",
        "db": "VULHUB",
        "id": "VHN-395783"
      },
      {
        "date": "2023-02-09T00:00:00",
        "db": "VULMON",
        "id": "CVE-2021-3618"
      },
      {
        "date": "2023-08-10T07:42:00",
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      },
      {
        "date": "2023-05-19T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      },
      {
        "date": "2024-11-21T06:21:59.713000",
        "db": "NVD",
        "id": "CVE-2021-3618"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "168672"
      },
      {
        "db": "PACKETSTORM",
        "id": "174729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      }
    ],
    "trust": 0.8
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "F5\u00a0Networks\u00a0 of \u00a0nginx\u00a0 Vulnerability related to certificate verification in products of multiple vendors",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2021-019676"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "trust management problem",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-202107-216"
      }
    ],
    "trust": 0.6
  }
}

CVE-2023-51765 (GCVE-0-2023-51765)

Vulnerability from nvd – Published: 2023-12-24 00:00 – Updated: 2024-08-02 22:48
VLAI?
Summary
sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T22:48:11.197Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2023/12/22/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2023/12/21/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/freebsd/freebsd-src/commit/5dd76dd0cc19450133aa379ce0ce4a68ae07fb39#diff-afdf514b32ac88004952c11660c57bc96c3d8b2234007c1cbd8d7ed7fd7935cc"
          },
          {
            "name": "[oss-security] 20231224 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
          },
          {
            "name": "[oss-security] 20231225 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.suse.com/show_bug.cgi?id=1218351"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255869"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2023-51765"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
          },
          {
            "name": "[oss-security] 20231226 Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/26/5"
          },
          {
            "name": "[oss-security] 20231229 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/29/5"
          },
          {
            "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/30/3"
          },
          {
            "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/30/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lwn.net/Articles/956533/"
          },
          {
            "name": "[debian-lts-announce] 20240615 [SECURITY] [DLA 3829-1] sendmail security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports \u003cLF\u003e.\u003cCR\u003e\u003cLF\u003e but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with \u0027o\u0027 in srv_features."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-15T09:05:58.617Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2023/12/22/7"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2023/12/21/7"
        },
        {
          "url": "https://github.com/freebsd/freebsd-src/commit/5dd76dd0cc19450133aa379ce0ce4a68ae07fb39#diff-afdf514b32ac88004952c11660c57bc96c3d8b2234007c1cbd8d7ed7fd7935cc"
        },
        {
          "name": "[oss-security] 20231224 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
        },
        {
          "name": "[oss-security] 20231225 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
        },
        {
          "url": "https://bugzilla.suse.com/show_bug.cgi?id=1218351"
        },
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255869"
        },
        {
          "url": "https://access.redhat.com/security/cve/CVE-2023-51765"
        },
        {
          "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
        },
        {
          "name": "[oss-security] 20231226 Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/26/5"
        },
        {
          "name": "[oss-security] 20231229 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/29/5"
        },
        {
          "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/30/3"
        },
        {
          "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/30/1"
        },
        {
          "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
        },
        {
          "url": "https://lwn.net/Articles/956533/"
        },
        {
          "name": "[debian-lts-announce] 20240615 [SECURITY] [DLA 3829-1] sendmail security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-51765",
    "datePublished": "2023-12-24T00:00:00.000Z",
    "dateReserved": "2023-12-24T00:00:00.000Z",
    "dateUpdated": "2024-08-02T22:48:11.197Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3618 (GCVE-0-2021-3618)

Vulnerability from nvd – Published: 2022-03-23 00:00 – Updated: 2024-08-03 17:01
VLAI?
Summary
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
n/a ALPACA Affected: vsftpd 3.0.4, nginx 1.21.0, sendmail 8.17
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:01:07.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://alpaca-attack.com/"
          },
          {
            "name": "[debian-lts-announce] 20221122 [SECURITY] [DLA 3203-1] nginx security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ALPACA",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "vsftpd 3.0.4, nginx 1.21.0, sendmail 8.17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim\u0027s traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-23T00:00:00.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623"
        },
        {
          "url": "https://alpaca-attack.com/"
        },
        {
          "name": "[debian-lts-announce] 20221122 [SECURITY] [DLA 3203-1] nginx security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2021-3618",
    "datePublished": "2022-03-23T00:00:00.000Z",
    "dateReserved": "2021-06-24T00:00:00.000Z",
    "dateUpdated": "2024-08-03T17:01:07.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3956 (GCVE-0-2014-3956)

Vulnerability from nvd – Published: 2014-06-04 10:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:18.265Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
          },
          {
            "name": "58628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/58628"
          },
          {
            "name": "FreeBSD-SA-14:11",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
          },
          {
            "name": "MDVSA-2015:128",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
          },
          {
            "name": "GLSA-201412-32",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
          },
          {
            "name": "openSUSE-SU-2014:0804",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
          },
          {
            "name": "MDVSA-2014:147",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
          },
          {
            "name": "FEDORA-2014-7093",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
          },
          {
            "name": "openSUSE-SU-2014:0805",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
          },
          {
            "name": "57455",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57455"
          },
          {
            "name": "67791",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/67791"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
          },
          {
            "name": "SSA:2014-156-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
          },
          {
            "name": "1030331",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1030331"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-28T19:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
        },
        {
          "name": "58628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/58628"
        },
        {
          "name": "FreeBSD-SA-14:11",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
        },
        {
          "name": "MDVSA-2015:128",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
        },
        {
          "name": "GLSA-201412-32",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
        },
        {
          "name": "openSUSE-SU-2014:0804",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
        },
        {
          "name": "MDVSA-2014:147",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
        },
        {
          "name": "FEDORA-2014-7093",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
        },
        {
          "name": "openSUSE-SU-2014:0805",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
        },
        {
          "name": "57455",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57455"
        },
        {
          "name": "67791",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/67791"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
        },
        {
          "name": "SSA:2014-156-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
        },
        {
          "name": "1030331",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1030331"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-3956",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
            },
            {
              "name": "58628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/58628"
            },
            {
              "name": "FreeBSD-SA-14:11",
              "refsource": "FREEBSD",
              "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
            },
            {
              "name": "MDVSA-2015:128",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
            },
            {
              "name": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
            },
            {
              "name": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
            },
            {
              "name": "GLSA-201412-32",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
            },
            {
              "name": "http://www.sendmail.com/sm/open_source/download/8.14.9/",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
            },
            {
              "name": "openSUSE-SU-2014:0804",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
            },
            {
              "name": "MDVSA-2014:147",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
            },
            {
              "name": "FEDORA-2014-7093",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
            },
            {
              "name": "openSUSE-SU-2014:0805",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
            },
            {
              "name": "57455",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/57455"
            },
            {
              "name": "67791",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/67791"
            },
            {
              "name": "http://advisories.mageia.org/MGASA-2014-0270.html",
              "refsource": "CONFIRM",
              "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
            },
            {
              "name": "SSA:2014-156-04",
              "refsource": "SLACKWARE",
              "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
            },
            {
              "name": "1030331",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1030331"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-3956",
    "datePublished": "2014-06-04T10:00:00.000Z",
    "dateReserved": "2014-06-03T00:00:00.000Z",
    "dateUpdated": "2024-08-06T10:57:18.265Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4565 (GCVE-0-2009-4565)

Vulnerability from nvd – Published: 2010-01-04 21:00 – Updated: 2024-08-07 07:08
VLAI?
Summary
sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/38314 third-party-advisoryx_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201206-30.xml vendor-advisoryx_refsource_GENTOO
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/39088 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3661 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/37998 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/37543 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2011/0415 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/43366 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.sendmail.org/releases/8.14.4 x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=126953289726317&w=2 vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2010/0719 vdb-entryx_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2011-02… vendor-advisoryx_refsource_REDHAT
http://www.debian.org/security/2010/dsa-1985 vendor-advisoryx_refsource_DEBIAN
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://marc.info/?l=bugtraq&m=126953289726317&w=2 vendor-advisoryx_refsource_HP
http://secunia.com/advisories/40109 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/38915 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/1386 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:08:38.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "38314",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38314"
          },
          {
            "name": "GLSA-201206-30",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
          },
          {
            "name": "1021797",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
          },
          {
            "name": "39088",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39088"
          },
          {
            "name": "ADV-2009-3661",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3661"
          },
          {
            "name": "37998",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37998"
          },
          {
            "name": "37543",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37543"
          },
          {
            "name": "ADV-2011-0415",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0415"
          },
          {
            "name": "43366",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43366"
          },
          {
            "name": "SUSE-SR:2010:006",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
          },
          {
            "name": "oval:org.mitre.oval:def:10255",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.14.4"
          },
          {
            "name": "HPSBUX02508",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
          },
          {
            "name": "ADV-2010-0719",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0719"
          },
          {
            "name": "RHSA-2011:0262",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
          },
          {
            "name": "DSA-1985",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-1985"
          },
          {
            "name": "oval:org.mitre.oval:def:11822",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
          },
          {
            "name": "SSRT100007",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
          },
          {
            "name": "40109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40109"
          },
          {
            "name": "38915",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38915"
          },
          {
            "name": "ADV-2010-1386",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1386"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-30T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "sendmail before 8.14.4 does not properly handle a \u0027\\0\u0027 character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "38314",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38314"
        },
        {
          "name": "GLSA-201206-30",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
        },
        {
          "name": "1021797",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
        },
        {
          "name": "39088",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39088"
        },
        {
          "name": "ADV-2009-3661",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3661"
        },
        {
          "name": "37998",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37998"
        },
        {
          "name": "37543",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37543"
        },
        {
          "name": "ADV-2011-0415",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0415"
        },
        {
          "name": "43366",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43366"
        },
        {
          "name": "SUSE-SR:2010:006",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
        },
        {
          "name": "oval:org.mitre.oval:def:10255",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.14.4"
        },
        {
          "name": "HPSBUX02508",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
        },
        {
          "name": "ADV-2010-0719",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0719"
        },
        {
          "name": "RHSA-2011:0262",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
        },
        {
          "name": "DSA-1985",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-1985"
        },
        {
          "name": "oval:org.mitre.oval:def:11822",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
        },
        {
          "name": "SSRT100007",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
        },
        {
          "name": "40109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40109"
        },
        {
          "name": "38915",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38915"
        },
        {
          "name": "ADV-2010-1386",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1386"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4565",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "sendmail before 8.14.4 does not properly handle a \u0027\\0\u0027 character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "38314",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38314"
            },
            {
              "name": "GLSA-201206-30",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
            },
            {
              "name": "1021797",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
            },
            {
              "name": "39088",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39088"
            },
            {
              "name": "ADV-2009-3661",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3661"
            },
            {
              "name": "37998",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37998"
            },
            {
              "name": "37543",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37543"
            },
            {
              "name": "ADV-2011-0415",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0415"
            },
            {
              "name": "43366",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43366"
            },
            {
              "name": "SUSE-SR:2010:006",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
            },
            {
              "name": "oval:org.mitre.oval:def:10255",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
            },
            {
              "name": "http://www.sendmail.org/releases/8.14.4",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.14.4"
            },
            {
              "name": "HPSBUX02508",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
            },
            {
              "name": "ADV-2010-0719",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0719"
            },
            {
              "name": "RHSA-2011:0262",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
            },
            {
              "name": "DSA-1985",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2010/dsa-1985"
            },
            {
              "name": "oval:org.mitre.oval:def:11822",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
            },
            {
              "name": "SSRT100007",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
            },
            {
              "name": "40109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40109"
            },
            {
              "name": "38915",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38915"
            },
            {
              "name": "ADV-2010-1386",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/1386"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4565",
    "datePublished": "2010-01-04T21:00:00.000Z",
    "dateReserved": "2010-01-04T00:00:00.000Z",
    "dateUpdated": "2024-08-07T07:08:38.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1490 (GCVE-0-2009-1490)

Vulnerability from nvd – Published: 2009-05-05 19:00 – Updated: 2024-08-07 05:13
VLAI?
Summary
Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.560Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.13.2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
          },
          {
            "name": "sendmail-xheader-bo(50355)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-27T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.13.2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
        },
        {
          "name": "sendmail-xheader-bo(50355)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1490",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sendmail.org/releases/8.13.2",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.13.2"
            },
            {
              "name": "http://www.nmrc.org/~thegnome/blog/apr09/",
              "refsource": "MISC",
              "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
            },
            {
              "name": "sendmail-xheader-bo(50355)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1490",
    "datePublished": "2009-05-05T19:00:00.000Z",
    "dateReserved": "2009-04-30T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:13:25.560Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-2246 (GCVE-0-2007-2246)

Vulnerability from nvd – Published: 2007-04-25 20:00 – Updated: 2024-08-07 13:33
VLAI?
Summary
Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors. NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1017966 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/23606 vdb-entryx_refsource_BID
http://www.kb.cert.org/vuls/id/349305 third-party-advisoryx_refsource_CERT-VN
http://secunia.com/advisories/24990 third-party-advisoryx_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2007/1504 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:33:28.308Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1017966",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017966"
          },
          {
            "name": "23606",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23606"
          },
          {
            "name": "VU#349305",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/349305"
          },
          {
            "name": "24990",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24990"
          },
          {
            "name": "SSRT061243",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
          },
          {
            "name": "HPSBUX02183",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
          },
          {
            "name": "ADV-2007-1504",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1504"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-16T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors.  NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-05-02T13:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1017966",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017966"
        },
        {
          "name": "23606",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23606"
        },
        {
          "name": "VU#349305",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/349305"
        },
        {
          "name": "24990",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24990"
        },
        {
          "name": "SSRT061243",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
        },
        {
          "name": "HPSBUX02183",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
        },
        {
          "name": "ADV-2007-1504",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1504"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2246",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors.  NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1017966",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017966"
            },
            {
              "name": "23606",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23606"
            },
            {
              "name": "VU#349305",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/349305"
            },
            {
              "name": "24990",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24990"
            },
            {
              "name": "SSRT061243",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
            },
            {
              "name": "HPSBUX02183",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
            },
            {
              "name": "ADV-2007-1504",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1504"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2246",
    "datePublished": "2007-04-25T20:00:00.000Z",
    "dateReserved": "2007-04-25T04:00:00.000Z",
    "dateUpdated": "2024-08-07T13:33:28.308Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-7176 (GCVE-0-2006-7176)

Vulnerability from nvd – Published: 2007-03-28 03:00 – Updated: 2024-08-07 20:57
VLAI?
Summary
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the "localhost.localdomain" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/25098 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/bugzilla/show_bug.cgi… x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2007-02… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/25743 third-party-advisoryx_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.securityfocus.com/bid/23742 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:39.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "25098",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25098"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
          },
          {
            "name": "RHSA-2007:0252",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
          },
          {
            "name": "25743",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25743"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
          },
          {
            "name": "oval:org.mitre.oval:def:11499",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
          },
          {
            "name": "23742",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23742"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-02T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the \"localhost.localdomain\" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T04:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "25098",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25098"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
        },
        {
          "name": "RHSA-2007:0252",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
        },
        {
          "name": "25743",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25743"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
        },
        {
          "name": "oval:org.mitre.oval:def:11499",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
        },
        {
          "name": "23742",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23742"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-7176",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the \"localhost.localdomain\" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "25098",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25098"
            },
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
            },
            {
              "name": "RHSA-2007:0252",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
            },
            {
              "name": "25743",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25743"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
            },
            {
              "name": "oval:org.mitre.oval:def:11499",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
            },
            {
              "name": "23742",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23742"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-7176",
    "datePublished": "2007-03-28T03:00:00.000Z",
    "dateReserved": "2007-03-27T04:00:00.000Z",
    "dateUpdated": "2024-08-07T20:57:39.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-7175 (GCVE-0-2006-7175)

Vulnerability from nvd – Published: 2007-03-28 03:00 – Updated: 2024-08-07 20:57
VLAI?
Summary
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:39.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-18T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-10-03T20:21:25.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-7175",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-7175",
    "datePublished": "2007-03-28T03:00:00.000Z",
    "dateReserved": "2007-03-27T04:00:00.000Z",
    "dateUpdated": "2024-08-07T20:57:39.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4434 (GCVE-0-2006-4434)

Vulnerability from nvd – Published: 2006-08-29 04:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.openbsd.org/errata.html#sendmail3 vendor-advisoryx_refsource_OPENBSD
http://www.attrition.org/pipermail/vim/2006-Augus… mailing-listx_refsource_VIM
http://securitytracker.com/id?1016753 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/21637 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3994 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/28193 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/21749 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/21700 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1164 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/21641 third-party-advisoryx_refsource_SECUNIA
http://www.sendmail.org/releases/8.13.8.html x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/3393 vdb-entryx_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/bid/19714 vdb-entryx_refsource_BID
http://www.novell.com/linux/security/advisories/2… vendor-advisoryx_refsource_SUSE
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/22369 third-party-advisoryx_refsource_SECUNIA
http://www.openbsd.org/errata38.html#sendmail3 vendor-advisoryx_refsource_OPENBSD
http://secunia.com/advisories/21696 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:07.644Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata.html#sendmail3"
          },
          {
            "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
            "tags": [
              "mailing-list",
              "x_refsource_VIM",
              "x_transferred"
            ],
            "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
          },
          {
            "name": "1016753",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016753"
          },
          {
            "name": "21637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21637"
          },
          {
            "name": "ADV-2006-3994",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3994"
          },
          {
            "name": "28193",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/28193"
          },
          {
            "name": "21749",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21749"
          },
          {
            "name": "21700",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21700"
          },
          {
            "name": "DSA-1164",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1164"
          },
          {
            "name": "21641",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21641"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.13.8.html"
          },
          {
            "name": "ADV-2006-3393",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3393"
          },
          {
            "name": "MDKSA-2006:156",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
          },
          {
            "name": "19714",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19714"
          },
          {
            "name": "SUSE-SR:2006:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
          },
          {
            "name": "102664",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
          },
          {
            "name": "22369",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22369"
          },
          {
            "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata38.html#sendmail3"
          },
          {
            "name": "21696",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21696"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-09T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long \"header line\", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying \"The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-09-02T13:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata.html#sendmail3"
        },
        {
          "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
          "tags": [
            "mailing-list",
            "x_refsource_VIM"
          ],
          "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
        },
        {
          "name": "1016753",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016753"
        },
        {
          "name": "21637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21637"
        },
        {
          "name": "ADV-2006-3994",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3994"
        },
        {
          "name": "28193",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/28193"
        },
        {
          "name": "21749",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21749"
        },
        {
          "name": "21700",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21700"
        },
        {
          "name": "DSA-1164",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1164"
        },
        {
          "name": "21641",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21641"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.13.8.html"
        },
        {
          "name": "ADV-2006-3393",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3393"
        },
        {
          "name": "MDKSA-2006:156",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
        },
        {
          "name": "19714",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19714"
        },
        {
          "name": "SUSE-SR:2006:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
        },
        {
          "name": "102664",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
        },
        {
          "name": "22369",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22369"
        },
        {
          "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata38.html#sendmail3"
        },
        {
          "name": "21696",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21696"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4434",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long \"header line\", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying \"The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata.html#sendmail3"
            },
            {
              "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
              "refsource": "VIM",
              "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
            },
            {
              "name": "1016753",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016753"
            },
            {
              "name": "21637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21637"
            },
            {
              "name": "ADV-2006-3994",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3994"
            },
            {
              "name": "28193",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/28193"
            },
            {
              "name": "21749",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21749"
            },
            {
              "name": "21700",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21700"
            },
            {
              "name": "DSA-1164",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1164"
            },
            {
              "name": "21641",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21641"
            },
            {
              "name": "http://www.sendmail.org/releases/8.13.8.html",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.13.8.html"
            },
            {
              "name": "ADV-2006-3393",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3393"
            },
            {
              "name": "MDKSA-2006:156",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
            },
            {
              "name": "19714",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19714"
            },
            {
              "name": "SUSE-SR:2006:021",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
            },
            {
              "name": "102664",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
            },
            {
              "name": "22369",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22369"
            },
            {
              "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata38.html#sendmail3"
            },
            {
              "name": "21696",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21696"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4434",
    "datePublished": "2006-08-29T04:00:00.000Z",
    "dateReserved": "2006-08-28T04:00:00.000Z",
    "dateUpdated": "2024-08-07T19:06:07.644Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1173 (GCVE-0-2006-1173)

Vulnerability from nvd – Published: 2006-06-08 03:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www-1.ibm.com/support/search.wss?rs=0&q=IY… vendor-advisoryx_refsource_AIXAPAR
http://itrc.hp.com/service/cki/docDisplay.do?docI… vendor-advisoryx_refsource_HP
http://www.debian.org/security/2006/dsa-1155 vendor-advisoryx_refsource_DEBIAN
http://www.openbsd.org/errata38.html#sendmail2 vendor-advisoryx_refsource_OPENBSD
http://secunia.com/advisories/20684 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/442939/100… vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2006/2388 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/20726 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.vupen.com/english/advisories/2006/2351 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/21327 third-party-advisoryx_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-05… vendor-advisoryx_refsource_REDHAT
http://www.vupen.com/english/advisories/2006/2389 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/21647 third-party-advisoryx_refsource_SECUNIA
http://www.fortinet.com/FortiGuardCenter/advisory… x_refsource_CONFIRM
https://issues.rpath.com/browse/RPL-526 x_refsource_CONFIRM
http://secunia.com/advisories/20651 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20683 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20650 third-party-advisoryx_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://secunia.com/advisories/20782 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3135 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1016295 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/20694 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20473 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/2189 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/440744/100… mailing-listx_refsource_BUGTRAQ
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.vupen.com/english/advisories/2006/2798 vdb-entryx_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://www.sendmail.com/security/advisories/SA-20… x_refsource_CONFIRM
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/20673 third-party-advisoryx_refsource_SECUNIA
http://www.f-secure.com/security/fsc-2006-5.shtml x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/438241/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/21612 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20654 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/2390 vdb-entryx_refsource_VUPEN
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.gentoo.org/security/en/glsa/glsa-20060… vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/18433 vdb-entryx_refsource_BID
http://secunia.com/advisories/20675 third-party-advisoryx_refsource_SECUNIA
http://lists.suse.com/archive/suse-security-annou… vendor-advisoryx_refsource_SUSE
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories… vendor-advisoryx_refsource_FREEBSD
http://www.securityfocus.com/archive/1/437928/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/442939/100… vendor-advisoryx_refsource_HP
http://www.kb.cert.org/vuls/id/146718 third-party-advisoryx_refsource_CERT-VN
http://itrc.hp.com/service/cki/docDisplay.do?docI… vendor-advisoryx_refsource_HP
http://secunia.com/advisories/15779 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20641 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20679 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/26197 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/21042 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/21160 third-party-advisoryx_refsource_SECUNIA
http://www-1.ibm.com/support/search.wss?rs=0&q=IY… vendor-advisoryx_refsource_AIXAPAR
http://www.securityfocus.com/archive/1/438330/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IY85415",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
          },
          {
            "name": "HPSBTU02116",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
          },
          {
            "name": "DSA-1155",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1155"
          },
          {
            "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata38.html#sendmail2"
          },
          {
            "name": "20684",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20684"
          },
          {
            "name": "HPSBUX02124",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
          },
          {
            "name": "ADV-2006-2388",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2388"
          },
          {
            "name": "20726",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20726"
          },
          {
            "name": "oval:org.mitre.oval:def:11253",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
          },
          {
            "name": "ADV-2006-2351",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2351"
          },
          {
            "name": "21327",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21327"
          },
          {
            "name": "RHSA-2006:0515",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
          },
          {
            "name": "ADV-2006-2389",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2389"
          },
          {
            "name": "21647",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21647"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-526"
          },
          {
            "name": "20651",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20651"
          },
          {
            "name": "20683",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20683"
          },
          {
            "name": "20650",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20650"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
          },
          {
            "name": "20782",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20782"
          },
          {
            "name": "ADV-2006-3135",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3135"
          },
          {
            "name": "1016295",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016295"
          },
          {
            "name": "20694",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20694"
          },
          {
            "name": "20473",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20473"
          },
          {
            "name": "ADV-2006-2189",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2189"
          },
          {
            "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
          },
          {
            "name": "20060601-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
          },
          {
            "name": "ADV-2006-2798",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2798"
          },
          {
            "name": "102460",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
          },
          {
            "name": "20060602-01-U",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
          },
          {
            "name": "MDKSA-2006:104",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
          },
          {
            "name": "sendmail-multipart-mime-dos(27128)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
          },
          {
            "name": "20673",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20673"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
          },
          {
            "name": "20060621 Re: Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
          },
          {
            "name": "21612",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21612"
          },
          {
            "name": "20654",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20654"
          },
          {
            "name": "ADV-2006-2390",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2390"
          },
          {
            "name": "SSA:2006-166-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
          },
          {
            "name": "GLSA-200606-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
          },
          {
            "name": "18433",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18433"
          },
          {
            "name": "20675",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20675"
          },
          {
            "name": "SUSE-SA:2006:032",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
          },
          {
            "name": "FreeBSD-SA-06:17.sendmail",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
          },
          {
            "name": "20060620 Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
          },
          {
            "name": "SSRT061159",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
          },
          {
            "name": "VU#146718",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/146718"
          },
          {
            "name": "SSRT061135",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
          },
          {
            "name": "15779",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15779"
          },
          {
            "name": "20641",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20641"
          },
          {
            "name": "20679",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20679"
          },
          {
            "name": "26197",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/26197"
          },
          {
            "name": "21042",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21042"
          },
          {
            "name": "21160",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21160"
          },
          {
            "name": "IY85930",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
          },
          {
            "name": "20060624 Re: Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-06T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T18:57:01.000Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "IY85415",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
        },
        {
          "name": "HPSBTU02116",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
        },
        {
          "name": "DSA-1155",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1155"
        },
        {
          "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata38.html#sendmail2"
        },
        {
          "name": "20684",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20684"
        },
        {
          "name": "HPSBUX02124",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
        },
        {
          "name": "ADV-2006-2388",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2388"
        },
        {
          "name": "20726",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20726"
        },
        {
          "name": "oval:org.mitre.oval:def:11253",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
        },
        {
          "name": "ADV-2006-2351",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2351"
        },
        {
          "name": "21327",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21327"
        },
        {
          "name": "RHSA-2006:0515",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
        },
        {
          "name": "ADV-2006-2389",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2389"
        },
        {
          "name": "21647",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21647"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-526"
        },
        {
          "name": "20651",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20651"
        },
        {
          "name": "20683",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20683"
        },
        {
          "name": "20650",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20650"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
        },
        {
          "name": "20782",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20782"
        },
        {
          "name": "ADV-2006-3135",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3135"
        },
        {
          "name": "1016295",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016295"
        },
        {
          "name": "20694",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20694"
        },
        {
          "name": "20473",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20473"
        },
        {
          "name": "ADV-2006-2189",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2189"
        },
        {
          "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
        },
        {
          "name": "20060601-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
        },
        {
          "name": "ADV-2006-2798",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2798"
        },
        {
          "name": "102460",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
        },
        {
          "name": "20060602-01-U",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
        },
        {
          "name": "MDKSA-2006:104",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
        },
        {
          "name": "sendmail-multipart-mime-dos(27128)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
        },
        {
          "name": "20673",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20673"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
        },
        {
          "name": "20060621 Re: Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
        },
        {
          "name": "21612",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21612"
        },
        {
          "name": "20654",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20654"
        },
        {
          "name": "ADV-2006-2390",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2390"
        },
        {
          "name": "SSA:2006-166-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
        },
        {
          "name": "GLSA-200606-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
        },
        {
          "name": "18433",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18433"
        },
        {
          "name": "20675",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20675"
        },
        {
          "name": "SUSE-SA:2006:032",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
        },
        {
          "name": "FreeBSD-SA-06:17.sendmail",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
        },
        {
          "name": "20060620 Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
        },
        {
          "name": "SSRT061159",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
        },
        {
          "name": "VU#146718",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/146718"
        },
        {
          "name": "SSRT061135",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
        },
        {
          "name": "15779",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15779"
        },
        {
          "name": "20641",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20641"
        },
        {
          "name": "20679",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20679"
        },
        {
          "name": "26197",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/26197"
        },
        {
          "name": "21042",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21042"
        },
        {
          "name": "21160",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21160"
        },
        {
          "name": "IY85930",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
        },
        {
          "name": "20060624 Re: Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2006-1173",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IY85415",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
            },
            {
              "name": "HPSBTU02116",
              "refsource": "HP",
              "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
            },
            {
              "name": "DSA-1155",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1155"
            },
            {
              "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata38.html#sendmail2"
            },
            {
              "name": "20684",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20684"
            },
            {
              "name": "HPSBUX02124",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
            },
            {
              "name": "ADV-2006-2388",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2388"
            },
            {
              "name": "20726",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20726"
            },
            {
              "name": "oval:org.mitre.oval:def:11253",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
            },
            {
              "name": "ADV-2006-2351",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2351"
            },
            {
              "name": "21327",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21327"
            },
            {
              "name": "RHSA-2006:0515",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
            },
            {
              "name": "ADV-2006-2389",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2389"
            },
            {
              "name": "21647",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21647"
            },
            {
              "name": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html",
              "refsource": "CONFIRM",
              "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-526",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-526"
            },
            {
              "name": "20651",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20651"
            },
            {
              "name": "20683",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20683"
            },
            {
              "name": "20650",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20650"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
            },
            {
              "name": "20782",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20782"
            },
            {
              "name": "ADV-2006-3135",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3135"
            },
            {
              "name": "1016295",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016295"
            },
            {
              "name": "20694",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20694"
            },
            {
              "name": "20473",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20473"
            },
            {
              "name": "ADV-2006-2189",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2189"
            },
            {
              "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
            },
            {
              "name": "20060601-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
            },
            {
              "name": "ADV-2006-2798",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2798"
            },
            {
              "name": "102460",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
            },
            {
              "name": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
            },
            {
              "name": "20060602-01-U",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
            },
            {
              "name": "MDKSA-2006:104",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
            },
            {
              "name": "sendmail-multipart-mime-dos(27128)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
            },
            {
              "name": "20673",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20673"
            },
            {
              "name": "http://www.f-secure.com/security/fsc-2006-5.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
            },
            {
              "name": "20060621 Re: Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
            },
            {
              "name": "21612",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21612"
            },
            {
              "name": "20654",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20654"
            },
            {
              "name": "ADV-2006-2390",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2390"
            },
            {
              "name": "SSA:2006-166-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
            },
            {
              "name": "GLSA-200606-19",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
            },
            {
              "name": "18433",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18433"
            },
            {
              "name": "20675",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20675"
            },
            {
              "name": "SUSE-SA:2006:032",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
            },
            {
              "name": "FreeBSD-SA-06:17.sendmail",
              "refsource": "FREEBSD",
              "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
            },
            {
              "name": "20060620 Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
            },
            {
              "name": "SSRT061159",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
            },
            {
              "name": "VU#146718",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/146718"
            },
            {
              "name": "SSRT061135",
              "refsource": "HP",
              "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
            },
            {
              "name": "15779",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15779"
            },
            {
              "name": "20641",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20641"
            },
            {
              "name": "20679",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20679"
            },
            {
              "name": "26197",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/26197"
            },
            {
              "name": "21042",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21042"
            },
            {
              "name": "21160",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21160"
            },
            {
              "name": "IY85930",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
            },
            {
              "name": "20060624 Re: Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2006-1173",
    "datePublished": "2006-06-08T03:00:00.000Z",
    "dateReserved": "2006-03-12T05:00:00.000Z",
    "dateUpdated": "2024-08-07T17:03:28.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2023-51765 (GCVE-0-2023-51765)

Vulnerability from cvelistv5 – Published: 2023-12-24 00:00 – Updated: 2024-08-02 22:48
VLAI?
Summary
sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports <LF>.<CR><LF> but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-02T22:48:11.197Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2023/12/22/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.openwall.com/lists/oss-security/2023/12/21/7"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://github.com/freebsd/freebsd-src/commit/5dd76dd0cc19450133aa379ce0ce4a68ae07fb39#diff-afdf514b32ac88004952c11660c57bc96c3d8b2234007c1cbd8d7ed7fd7935cc"
          },
          {
            "name": "[oss-security] 20231224 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
          },
          {
            "name": "[oss-security] 20231225 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.suse.com/show_bug.cgi?id=1218351"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255869"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://access.redhat.com/security/cve/CVE-2023-51765"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
          },
          {
            "name": "[oss-security] 20231226 Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/26/5"
          },
          {
            "name": "[oss-security] 20231229 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/29/5"
          },
          {
            "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/30/3"
          },
          {
            "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "http://www.openwall.com/lists/oss-security/2023/12/30/1"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://lwn.net/Articles/956533/"
          },
          {
            "name": "[debian-lts-announce] 20240615 [SECURITY] [DLA 3829-1] sendmail security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports \u003cLF\u003e.\u003cCR\u003e\u003cLF\u003e but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with \u0027o\u0027 in srv_features."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2024-06-15T09:05:58.617Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "url": "https://sec-consult.com/blog/detail/smtp-smuggling-spoofing-e-mails-worldwide/"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2023/12/22/7"
        },
        {
          "url": "https://www.openwall.com/lists/oss-security/2023/12/21/7"
        },
        {
          "url": "https://github.com/freebsd/freebsd-src/commit/5dd76dd0cc19450133aa379ce0ce4a68ae07fb39#diff-afdf514b32ac88004952c11660c57bc96c3d8b2234007c1cbd8d7ed7fd7935cc"
        },
        {
          "name": "[oss-security] 20231224 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/24/1"
        },
        {
          "name": "[oss-security] 20231225 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/25/1"
        },
        {
          "url": "https://bugzilla.suse.com/show_bug.cgi?id=1218351"
        },
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=2255869"
        },
        {
          "url": "https://access.redhat.com/security/cve/CVE-2023-51765"
        },
        {
          "url": "https://fahrplan.events.ccc.de/congress/2023/fahrplan/events/11782.html"
        },
        {
          "name": "[oss-security] 20231226 Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/26/5"
        },
        {
          "name": "[oss-security] 20231229 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/29/5"
        },
        {
          "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/30/3"
        },
        {
          "name": "[oss-security] 20231230 Re: Re: New SMTP smuggling attack",
          "tags": [
            "mailing-list"
          ],
          "url": "http://www.openwall.com/lists/oss-security/2023/12/30/1"
        },
        {
          "url": "https://www.youtube.com/watch?v=V8KPV96g1To"
        },
        {
          "url": "https://lwn.net/Articles/956533/"
        },
        {
          "name": "[debian-lts-announce] 20240615 [SECURITY] [DLA 3829-1] sendmail security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2024/06/msg00004.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2023-51765",
    "datePublished": "2023-12-24T00:00:00.000Z",
    "dateReserved": "2023-12-24T00:00:00.000Z",
    "dateUpdated": "2024-08-02T22:48:11.197Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2021-3618 (GCVE-0-2021-3618)

Vulnerability from cvelistv5 – Published: 2022-03-23 00:00 – Updated: 2024-08-03 17:01
VLAI?
Summary
ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer.
Severity ?
No CVSS data available.
CWE
Assigner
Impacted products
Vendor Product Version
n/a ALPACA Affected: vsftpd 3.0.4, nginx 1.21.0, sendmail 8.17
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-03T17:01:07.459Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623"
          },
          {
            "tags": [
              "x_transferred"
            ],
            "url": "https://alpaca-attack.com/"
          },
          {
            "name": "[debian-lts-announce] 20221122 [SECURITY] [DLA 3203-1] nginx security update",
            "tags": [
              "mailing-list",
              "x_transferred"
            ],
            "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "ALPACA",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "vsftpd 3.0.4, nginx 1.21.0, sendmail 8.17"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim\u0027s traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS session. This breaks the authentication of TLS and cross-protocol attacks may be possible where the behavior of one protocol service may compromise the other at the application layer."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "cweId": "CWE-295",
              "description": "CWE-295",
              "lang": "en",
              "type": "CWE"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-11-23T00:00:00.000Z",
        "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
        "shortName": "redhat"
      },
      "references": [
        {
          "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1975623"
        },
        {
          "url": "https://alpaca-attack.com/"
        },
        {
          "name": "[debian-lts-announce] 20221122 [SECURITY] [DLA 3203-1] nginx security update",
          "tags": [
            "mailing-list"
          ],
          "url": "https://lists.debian.org/debian-lts-announce/2022/11/msg00031.html"
        }
      ]
    }
  },
  "cveMetadata": {
    "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749",
    "assignerShortName": "redhat",
    "cveId": "CVE-2021-3618",
    "datePublished": "2022-03-23T00:00:00.000Z",
    "dateReserved": "2021-06-24T00:00:00.000Z",
    "dateUpdated": "2024-08-03T17:01:07.459Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2014-3956 (GCVE-0-2014-3956)

Vulnerability from cvelistv5 – Published: 2014-06-04 10:00 – Updated: 2024-08-06 10:57
VLAI?
Summary
The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-06T10:57:18.265Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
          },
          {
            "name": "58628",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/58628"
          },
          {
            "name": "FreeBSD-SA-14:11",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
          },
          {
            "name": "MDVSA-2015:128",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
          },
          {
            "name": "GLSA-201412-32",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
          },
          {
            "name": "openSUSE-SU-2014:0804",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
          },
          {
            "name": "MDVSA-2014:147",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
          },
          {
            "name": "FEDORA-2014-7093",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
          },
          {
            "name": "openSUSE-SU-2014:0805",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
          },
          {
            "name": "57455",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/57455"
          },
          {
            "name": "67791",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/67791"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
          },
          {
            "name": "SSA:2014-156-04",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
          },
          {
            "name": "1030331",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id/1030331"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2014-05-21T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-12-28T19:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
        },
        {
          "name": "58628",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/58628"
        },
        {
          "name": "FreeBSD-SA-14:11",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
        },
        {
          "name": "MDVSA-2015:128",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
        },
        {
          "name": "GLSA-201412-32",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
        },
        {
          "name": "openSUSE-SU-2014:0804",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
        },
        {
          "name": "MDVSA-2014:147",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
        },
        {
          "name": "FEDORA-2014-7093",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
        },
        {
          "name": "openSUSE-SU-2014:0805",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
        },
        {
          "name": "57455",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/57455"
        },
        {
          "name": "67791",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/67791"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
        },
        {
          "name": "SSA:2014-156-04",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
        },
        {
          "name": "1030331",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id/1030331"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2014-3956",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368",
              "refsource": "CONFIRM",
              "url": "https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368"
            },
            {
              "name": "58628",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/58628"
            },
            {
              "name": "FreeBSD-SA-14:11",
              "refsource": "FREEBSD",
              "url": "http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc"
            },
            {
              "name": "MDVSA-2015:128",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2015:128"
            },
            {
              "name": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html",
              "refsource": "MISC",
              "url": "http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html"
            },
            {
              "name": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES",
              "refsource": "CONFIRM",
              "url": "ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES"
            },
            {
              "name": "GLSA-201412-32",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201412-32.xml"
            },
            {
              "name": "http://www.sendmail.com/sm/open_source/download/8.14.9/",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.com/sm/open_source/download/8.14.9/"
            },
            {
              "name": "openSUSE-SU-2014:0804",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html"
            },
            {
              "name": "MDVSA-2014:147",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2014:147"
            },
            {
              "name": "FEDORA-2014-7093",
              "refsource": "FEDORA",
              "url": "http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html"
            },
            {
              "name": "openSUSE-SU-2014:0805",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html"
            },
            {
              "name": "57455",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/57455"
            },
            {
              "name": "67791",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/67791"
            },
            {
              "name": "http://advisories.mageia.org/MGASA-2014-0270.html",
              "refsource": "CONFIRM",
              "url": "http://advisories.mageia.org/MGASA-2014-0270.html"
            },
            {
              "name": "SSA:2014-156-04",
              "refsource": "SLACKWARE",
              "url": "http://www.slackware.com/security/viewer.php?l=slackware-security\u0026y=2014\u0026m=slackware-security.728644"
            },
            {
              "name": "1030331",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id/1030331"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2014-3956",
    "datePublished": "2014-06-04T10:00:00.000Z",
    "dateReserved": "2014-06-03T00:00:00.000Z",
    "dateUpdated": "2024-08-06T10:57:18.265Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-4565 (GCVE-0-2009-4565)

Vulnerability from cvelistv5 – Published: 2010-01-04 21:00 – Updated: 2024-08-07 07:08
VLAI?
Summary
sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/38314 third-party-advisoryx_refsource_SECUNIA
http://security.gentoo.org/glsa/glsa-201206-30.xml vendor-advisoryx_refsource_GENTOO
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/39088 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2009/3661 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/37998 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/bid/37543 vdb-entryx_refsource_BID
http://www.vupen.com/english/advisories/2011/0415 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/43366 third-party-advisoryx_refsource_SECUNIA
http://lists.opensuse.org/opensuse-security-annou… vendor-advisoryx_refsource_SUSE
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.sendmail.org/releases/8.14.4 x_refsource_CONFIRM
http://marc.info/?l=bugtraq&m=126953289726317&w=2 vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2010/0719 vdb-entryx_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2011-02… vendor-advisoryx_refsource_REDHAT
http://www.debian.org/security/2010/dsa-1985 vendor-advisoryx_refsource_DEBIAN
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://marc.info/?l=bugtraq&m=126953289726317&w=2 vendor-advisoryx_refsource_HP
http://secunia.com/advisories/40109 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/38915 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2010/1386 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:08:38.091Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "38314",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38314"
          },
          {
            "name": "GLSA-201206-30",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
          },
          {
            "name": "1021797",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
          },
          {
            "name": "39088",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/39088"
          },
          {
            "name": "ADV-2009-3661",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3661"
          },
          {
            "name": "37998",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37998"
          },
          {
            "name": "37543",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37543"
          },
          {
            "name": "ADV-2011-0415",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2011/0415"
          },
          {
            "name": "43366",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/43366"
          },
          {
            "name": "SUSE-SR:2010:006",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
          },
          {
            "name": "oval:org.mitre.oval:def:10255",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.14.4"
          },
          {
            "name": "HPSBUX02508",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
          },
          {
            "name": "ADV-2010-0719",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/0719"
          },
          {
            "name": "RHSA-2011:0262",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
          },
          {
            "name": "DSA-1985",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2010/dsa-1985"
          },
          {
            "name": "oval:org.mitre.oval:def:11822",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
          },
          {
            "name": "SSRT100007",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
          },
          {
            "name": "40109",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/40109"
          },
          {
            "name": "38915",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/38915"
          },
          {
            "name": "ADV-2010-1386",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1386"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-30T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "sendmail before 8.14.4 does not properly handle a \u0027\\0\u0027 character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-09-18T12:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "38314",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38314"
        },
        {
          "name": "GLSA-201206-30",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
        },
        {
          "name": "1021797",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
        },
        {
          "name": "39088",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/39088"
        },
        {
          "name": "ADV-2009-3661",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3661"
        },
        {
          "name": "37998",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37998"
        },
        {
          "name": "37543",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37543"
        },
        {
          "name": "ADV-2011-0415",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2011/0415"
        },
        {
          "name": "43366",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/43366"
        },
        {
          "name": "SUSE-SR:2010:006",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
        },
        {
          "name": "oval:org.mitre.oval:def:10255",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.14.4"
        },
        {
          "name": "HPSBUX02508",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
        },
        {
          "name": "ADV-2010-0719",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/0719"
        },
        {
          "name": "RHSA-2011:0262",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
        },
        {
          "name": "DSA-1985",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2010/dsa-1985"
        },
        {
          "name": "oval:org.mitre.oval:def:11822",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
        },
        {
          "name": "SSRT100007",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
        },
        {
          "name": "40109",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/40109"
        },
        {
          "name": "38915",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/38915"
        },
        {
          "name": "ADV-2010-1386",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1386"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4565",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "sendmail before 8.14.4 does not properly handle a \u0027\\0\u0027 character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "38314",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38314"
            },
            {
              "name": "GLSA-201206-30",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-201206-30.xml"
            },
            {
              "name": "1021797",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1021797.1-1"
            },
            {
              "name": "39088",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/39088"
            },
            {
              "name": "ADV-2009-3661",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3661"
            },
            {
              "name": "37998",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37998"
            },
            {
              "name": "37543",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37543"
            },
            {
              "name": "ADV-2011-0415",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2011/0415"
            },
            {
              "name": "43366",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/43366"
            },
            {
              "name": "SUSE-SR:2010:006",
              "refsource": "SUSE",
              "url": "http://lists.opensuse.org/opensuse-security-announce/2010-03/msg00004.html"
            },
            {
              "name": "oval:org.mitre.oval:def:10255",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10255"
            },
            {
              "name": "http://www.sendmail.org/releases/8.14.4",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.14.4"
            },
            {
              "name": "HPSBUX02508",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
            },
            {
              "name": "ADV-2010-0719",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/0719"
            },
            {
              "name": "RHSA-2011:0262",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2011-0262.html"
            },
            {
              "name": "DSA-1985",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2010/dsa-1985"
            },
            {
              "name": "oval:org.mitre.oval:def:11822",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11822"
            },
            {
              "name": "SSRT100007",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=126953289726317\u0026w=2"
            },
            {
              "name": "40109",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/40109"
            },
            {
              "name": "38915",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/38915"
            },
            {
              "name": "ADV-2010-1386",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/1386"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4565",
    "datePublished": "2010-01-04T21:00:00.000Z",
    "dateReserved": "2010-01-04T00:00:00.000Z",
    "dateUpdated": "2024-08-07T07:08:38.091Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2009-1490 (GCVE-0-2009-1490)

Vulnerability from cvelistv5 – Published: 2009-05-05 19:00 – Updated: 2024-08-07 05:13
VLAI?
Summary
Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T05:13:25.560Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.13.2"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
          },
          {
            "name": "sendmail-xheader-bo(50355)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-04-27T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-16T14:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.13.2"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
        },
        {
          "name": "sendmail-xheader-bo(50355)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-1490",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://www.sendmail.org/releases/8.13.2",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.13.2"
            },
            {
              "name": "http://www.nmrc.org/~thegnome/blog/apr09/",
              "refsource": "MISC",
              "url": "http://www.nmrc.org/~thegnome/blog/apr09/"
            },
            {
              "name": "sendmail-xheader-bo(50355)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/50355"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-1490",
    "datePublished": "2009-05-05T19:00:00.000Z",
    "dateReserved": "2009-04-30T00:00:00.000Z",
    "dateUpdated": "2024-08-07T05:13:25.560Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-2423 (GCVE-0-2002-2423)

Vulnerability from cvelistv5 – Published: 2007-11-01 17:00 – Updated: 2024-09-16 17:17
VLAI?
Summary
Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remote attackers to prevent the IP address from being logged via a long IDENT response.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T04:06:53.908Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "5770",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/5770"
          },
          {
            "name": "20020921 Sendmail logging and short string precision allows anonymous commands/relay",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2002/09/msg00267.html"
          },
          {
            "name": "sendmail-ident-logging-bypass(10153)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/10153.php"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remote attackers to prevent the IP address from being logged via a long IDENT response."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-11-01T17:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "5770",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/5770"
        },
        {
          "name": "20020921 Sendmail logging and short string precision allows anonymous commands/relay",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2002/09/msg00267.html"
        },
        {
          "name": "sendmail-ident-logging-bypass(10153)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/10153.php"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-2423",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remote attackers to prevent the IP address from being logged via a long IDENT response."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "5770",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/5770"
            },
            {
              "name": "20020921 Sendmail logging and short string precision allows anonymous commands/relay",
              "refsource": "BUGTRAQ",
              "url": "http://archive.cert.uni-stuttgart.de/bugtraq/2002/09/msg00267.html"
            },
            {
              "name": "sendmail-ident-logging-bypass(10153)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/10153.php"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-2423",
    "datePublished": "2007-11-01T17:00:00.000Z",
    "dateReserved": "2007-11-01T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:17:37.413Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-2261 (GCVE-0-2002-2261)

Vulnerability from cvelistv5 – Published: 2007-10-18 10:00 – Updated: 2024-08-08 03:59
VLAI?
Summary
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.sendmail.org/8.12.7.html x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2009/3539 vdb-entryx_refsource_VUPEN
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://securitytracker.com/id?1005748 vdb-entryx_refsource_SECTRACK
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.securityfocus.com/bid/6548 vdb-entryx_refsource_BID
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/7826 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:59:11.838Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "oval:org.mitre.oval:def:6892",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6892"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/8.12.7.html"
          },
          {
            "name": "ADV-2009-3539",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2009/3539"
          },
          {
            "name": "oval:org.mitre.oval:def:8512",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8512"
          },
          {
            "name": "1005748",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1005748"
          },
          {
            "name": "20030101-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20030101-01-P"
          },
          {
            "name": "6548",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/6548"
          },
          {
            "name": "sendmail-check-relay-bypass(10775)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10775"
          },
          {
            "name": "7826",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/7826"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-12-03T00:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the \u0027check_relay\u0027 function by spoofing a blank DNS hostname."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "oval:org.mitre.oval:def:6892",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6892"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/8.12.7.html"
        },
        {
          "name": "ADV-2009-3539",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2009/3539"
        },
        {
          "name": "oval:org.mitre.oval:def:8512",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8512"
        },
        {
          "name": "1005748",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1005748"
        },
        {
          "name": "20030101-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20030101-01-P"
        },
        {
          "name": "6548",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/6548"
        },
        {
          "name": "sendmail-check-relay-bypass(10775)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10775"
        },
        {
          "name": "7826",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/7826"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-2261",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the \u0027check_relay\u0027 function by spoofing a blank DNS hostname."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "oval:org.mitre.oval:def:6892",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6892"
            },
            {
              "name": "http://www.sendmail.org/8.12.7.html",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/8.12.7.html"
            },
            {
              "name": "ADV-2009-3539",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2009/3539"
            },
            {
              "name": "oval:org.mitre.oval:def:8512",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8512"
            },
            {
              "name": "1005748",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1005748"
            },
            {
              "name": "20030101-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20030101-01-P"
            },
            {
              "name": "6548",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/6548"
            },
            {
              "name": "sendmail-check-relay-bypass(10775)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/10775"
            },
            {
              "name": "7826",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/7826"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-2261",
    "datePublished": "2007-10-18T10:00:00.000Z",
    "dateReserved": "2007-10-17T00:00:00.000Z",
    "dateUpdated": "2024-08-08T03:59:11.838Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-1999-1592 (GCVE-0-1999-1592)

Vulnerability from cvelistv5 – Published: 2007-07-12 17:00 – Updated: 2024-09-16 17:03
VLAI?
Summary
Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact. NOTE: this might overlap CVE-1999-0129.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUN
http://www.securityfocus.com/bid/243 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-01T17:18:07.602Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "00159",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUN",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1"
          },
          {
            "name": "243",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/243"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact.  NOTE: this might overlap CVE-1999-0129."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-07-12T17:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "00159",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUN"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1"
        },
        {
          "name": "243",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/243"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-1999-1592",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact.  NOTE: this might overlap CVE-1999-0129."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "00159",
              "refsource": "SUN",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1"
            },
            {
              "name": "243",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/243"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-1999-1592",
    "datePublished": "2007-07-12T17:00:00.000Z",
    "dateReserved": "2007-07-12T00:00:00.000Z",
    "dateUpdated": "2024-09-16T17:03:10.002Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2007-2246 (GCVE-0-2007-2246)

Vulnerability from cvelistv5 – Published: 2007-04-25 20:00 – Updated: 2024-08-07 13:33
VLAI?
Summary
Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors. NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.securitytracker.com/id?1017966 vdb-entryx_refsource_SECTRACK
http://www.securityfocus.com/bid/23606 vdb-entryx_refsource_BID
http://www.kb.cert.org/vuls/id/349305 third-party-advisoryx_refsource_CERT-VN
http://secunia.com/advisories/24990 third-party-advisoryx_refsource_SECUNIA
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2007/1504 vdb-entryx_refsource_VUPEN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T13:33:28.308Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1017966",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://www.securitytracker.com/id?1017966"
          },
          {
            "name": "23606",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23606"
          },
          {
            "name": "VU#349305",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/349305"
          },
          {
            "name": "24990",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/24990"
          },
          {
            "name": "SSRT061243",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
          },
          {
            "name": "HPSBUX02183",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
          },
          {
            "name": "ADV-2007-1504",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/1504"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-04-16T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors.  NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-05-02T13:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1017966",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://www.securitytracker.com/id?1017966"
        },
        {
          "name": "23606",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23606"
        },
        {
          "name": "VU#349305",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/349305"
        },
        {
          "name": "24990",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/24990"
        },
        {
          "name": "SSRT061243",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
        },
        {
          "name": "HPSBUX02183",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
        },
        {
          "name": "ADV-2007-1504",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/1504"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-2246",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors.  NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-2006-4434."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1017966",
              "refsource": "SECTRACK",
              "url": "http://www.securitytracker.com/id?1017966"
            },
            {
              "name": "23606",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23606"
            },
            {
              "name": "VU#349305",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/349305"
            },
            {
              "name": "24990",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/24990"
            },
            {
              "name": "SSRT061243",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
            },
            {
              "name": "HPSBUX02183",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00841370"
            },
            {
              "name": "ADV-2007-1504",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/1504"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-2246",
    "datePublished": "2007-04-25T20:00:00.000Z",
    "dateReserved": "2007-04-25T04:00:00.000Z",
    "dateUpdated": "2024-08-07T13:33:28.308Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-7176 (GCVE-0-2006-7176)

Vulnerability from cvelistv5 – Published: 2007-03-28 03:00 – Updated: 2024-08-07 20:57
VLAI?
Summary
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the "localhost.localdomain" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://secunia.com/advisories/25098 third-party-advisoryx_refsource_SECUNIA
https://bugzilla.redhat.com/bugzilla/show_bug.cgi… x_refsource_MISC
http://www.redhat.com/support/errata/RHSA-2007-02… vendor-advisoryx_refsource_REDHAT
http://secunia.com/advisories/25743 third-party-advisoryx_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.securityfocus.com/bid/23742 vdb-entryx_refsource_BID
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:39.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "25098",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25098"
          },
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
          },
          {
            "name": "RHSA-2007:0252",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
          },
          {
            "name": "25743",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/25743"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
          },
          {
            "name": "oval:org.mitre.oval:def:11499",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
          },
          {
            "name": "23742",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/23742"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-10-02T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the \"localhost.localdomain\" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T04:57:01.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "25098",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25098"
        },
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
        },
        {
          "name": "RHSA-2007:0252",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
        },
        {
          "name": "25743",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/25743"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
        },
        {
          "name": "oval:org.mitre.oval:def:11499",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
        },
        {
          "name": "23742",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/23742"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-7176",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the \"localhost.localdomain\" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "25098",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25098"
            },
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=171838"
            },
            {
              "name": "RHSA-2007:0252",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2007-0252.html"
            },
            {
              "name": "25743",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/25743"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2007-248.htm"
            },
            {
              "name": "oval:org.mitre.oval:def:11499",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11499"
            },
            {
              "name": "23742",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/23742"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-7176",
    "datePublished": "2007-03-28T03:00:00.000Z",
    "dateReserved": "2007-03-27T04:00:00.000Z",
    "dateUpdated": "2024-08-07T20:57:39.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-7175 (GCVE-0-2006-7175)

Vulnerability from cvelistv5 – Published: 2007-03-28 03:00 – Updated: 2024-08-07 20:57
VLAI?
Summary
The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T20:57:39.637Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_MISC",
              "x_transferred"
            ],
            "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-18T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2022-10-03T20:21:25.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_MISC"
          ],
          "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-7175",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352",
              "refsource": "MISC",
              "url": "https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=172352"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-7175",
    "datePublished": "2007-03-28T03:00:00.000Z",
    "dateReserved": "2007-03-27T04:00:00.000Z",
    "dateUpdated": "2024-08-07T20:57:39.637Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-4434 (GCVE-0-2006-4434)

Vulnerability from cvelistv5 – Published: 2006-08-29 04:00 – Updated: 2024-08-07 19:06
VLAI?
Summary
Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.openbsd.org/errata.html#sendmail3 vendor-advisoryx_refsource_OPENBSD
http://www.attrition.org/pipermail/vim/2006-Augus… mailing-listx_refsource_VIM
http://securitytracker.com/id?1016753 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/21637 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3994 vdb-entryx_refsource_VUPEN
http://www.osvdb.org/28193 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/21749 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/21700 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1164 vendor-advisoryx_refsource_DEBIAN
http://secunia.com/advisories/21641 third-party-advisoryx_refsource_SECUNIA
http://www.sendmail.org/releases/8.13.8.html x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2006/3393 vdb-entryx_refsource_VUPEN
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www.securityfocus.com/bid/19714 vdb-entryx_refsource_BID
http://www.novell.com/linux/security/advisories/2… vendor-advisoryx_refsource_SUSE
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/22369 third-party-advisoryx_refsource_SECUNIA
http://www.openbsd.org/errata38.html#sendmail3 vendor-advisoryx_refsource_OPENBSD
http://secunia.com/advisories/21696 third-party-advisoryx_refsource_SECUNIA
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T19:06:07.644Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata.html#sendmail3"
          },
          {
            "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
            "tags": [
              "mailing-list",
              "x_refsource_VIM",
              "x_transferred"
            ],
            "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
          },
          {
            "name": "1016753",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016753"
          },
          {
            "name": "21637",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21637"
          },
          {
            "name": "ADV-2006-3994",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3994"
          },
          {
            "name": "28193",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/28193"
          },
          {
            "name": "21749",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21749"
          },
          {
            "name": "21700",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21700"
          },
          {
            "name": "DSA-1164",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1164"
          },
          {
            "name": "21641",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21641"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/releases/8.13.8.html"
          },
          {
            "name": "ADV-2006-3393",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3393"
          },
          {
            "name": "MDKSA-2006:156",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
          },
          {
            "name": "19714",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/19714"
          },
          {
            "name": "SUSE-SR:2006:021",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
          },
          {
            "name": "102664",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
          },
          {
            "name": "22369",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/22369"
          },
          {
            "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata38.html#sendmail3"
          },
          {
            "name": "21696",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21696"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-08-09T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long \"header line\", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying \"The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2006-09-02T13:00:00.000Z",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata.html#sendmail3"
        },
        {
          "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
          "tags": [
            "mailing-list",
            "x_refsource_VIM"
          ],
          "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
        },
        {
          "name": "1016753",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016753"
        },
        {
          "name": "21637",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21637"
        },
        {
          "name": "ADV-2006-3994",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3994"
        },
        {
          "name": "28193",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/28193"
        },
        {
          "name": "21749",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21749"
        },
        {
          "name": "21700",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21700"
        },
        {
          "name": "DSA-1164",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1164"
        },
        {
          "name": "21641",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21641"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/releases/8.13.8.html"
        },
        {
          "name": "ADV-2006-3393",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3393"
        },
        {
          "name": "MDKSA-2006:156",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
        },
        {
          "name": "19714",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/19714"
        },
        {
          "name": "SUSE-SR:2006:021",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
        },
        {
          "name": "102664",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
        },
        {
          "name": "22369",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/22369"
        },
        {
          "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata38.html#sendmail3"
        },
        {
          "name": "21696",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21696"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-4434",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long \"header line\", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying \"The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "[3.9] 20060825 005: SECURITY FIX: August 25, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata.html#sendmail3"
            },
            {
              "name": "20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd)",
              "refsource": "VIM",
              "url": "http://www.attrition.org/pipermail/vim/2006-August/000999.html"
            },
            {
              "name": "1016753",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016753"
            },
            {
              "name": "21637",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21637"
            },
            {
              "name": "ADV-2006-3994",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3994"
            },
            {
              "name": "28193",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/28193"
            },
            {
              "name": "21749",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21749"
            },
            {
              "name": "21700",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21700"
            },
            {
              "name": "DSA-1164",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1164"
            },
            {
              "name": "21641",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21641"
            },
            {
              "name": "http://www.sendmail.org/releases/8.13.8.html",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/releases/8.13.8.html"
            },
            {
              "name": "ADV-2006-3393",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3393"
            },
            {
              "name": "MDKSA-2006:156",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:156"
            },
            {
              "name": "19714",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/19714"
            },
            {
              "name": "SUSE-SR:2006:021",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_21_sr.html"
            },
            {
              "name": "102664",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1"
            },
            {
              "name": "22369",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/22369"
            },
            {
              "name": "[3.8] 20060825 010: SECURITY FIX: August 25, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata38.html#sendmail3"
            },
            {
              "name": "21696",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21696"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-4434",
    "datePublished": "2006-08-29T04:00:00.000Z",
    "dateReserved": "2006-08-28T04:00:00.000Z",
    "dateUpdated": "2024-08-07T19:06:07.644Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-1173 (GCVE-0-2006-1173)

Vulnerability from cvelistv5 – Published: 2006-06-08 03:00 – Updated: 2024-08-07 17:03
VLAI?
Summary
Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www-1.ibm.com/support/search.wss?rs=0&q=IY… vendor-advisoryx_refsource_AIXAPAR
http://itrc.hp.com/service/cki/docDisplay.do?docI… vendor-advisoryx_refsource_HP
http://www.debian.org/security/2006/dsa-1155 vendor-advisoryx_refsource_DEBIAN
http://www.openbsd.org/errata38.html#sendmail2 vendor-advisoryx_refsource_OPENBSD
http://secunia.com/advisories/20684 third-party-advisoryx_refsource_SECUNIA
http://www.securityfocus.com/archive/1/442939/100… vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2006/2388 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/20726 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.vupen.com/english/advisories/2006/2351 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/21327 third-party-advisoryx_refsource_SECUNIA
http://www.redhat.com/support/errata/RHSA-2006-05… vendor-advisoryx_refsource_REDHAT
http://www.vupen.com/english/advisories/2006/2389 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/21647 third-party-advisoryx_refsource_SECUNIA
http://www.fortinet.com/FortiGuardCenter/advisory… x_refsource_CONFIRM
https://issues.rpath.com/browse/RPL-526 x_refsource_CONFIRM
http://secunia.com/advisories/20651 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20683 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20650 third-party-advisoryx_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://secunia.com/advisories/20782 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/3135 vdb-entryx_refsource_VUPEN
http://securitytracker.com/id?1016295 vdb-entryx_refsource_SECTRACK
http://secunia.com/advisories/20694 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20473 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/2189 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/440744/100… mailing-listx_refsource_BUGTRAQ
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.vupen.com/english/advisories/2006/2798 vdb-entryx_refsource_VUPEN
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://www.sendmail.com/security/advisories/SA-20… x_refsource_CONFIRM
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://secunia.com/advisories/20673 third-party-advisoryx_refsource_SECUNIA
http://www.f-secure.com/security/fsc-2006-5.shtml x_refsource_CONFIRM
http://www.securityfocus.com/archive/1/438241/100… mailing-listx_refsource_BUGTRAQ
http://secunia.com/advisories/21612 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20654 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/2390 vdb-entryx_refsource_VUPEN
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www.gentoo.org/security/en/glsa/glsa-20060… vendor-advisoryx_refsource_GENTOO
http://www.securityfocus.com/bid/18433 vdb-entryx_refsource_BID
http://secunia.com/advisories/20675 third-party-advisoryx_refsource_SECUNIA
http://lists.suse.com/archive/suse-security-annou… vendor-advisoryx_refsource_SUSE
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories… vendor-advisoryx_refsource_FREEBSD
http://www.securityfocus.com/archive/1/437928/100… mailing-listx_refsource_BUGTRAQ
http://www.securityfocus.com/archive/1/442939/100… vendor-advisoryx_refsource_HP
http://www.kb.cert.org/vuls/id/146718 third-party-advisoryx_refsource_CERT-VN
http://itrc.hp.com/service/cki/docDisplay.do?docI… vendor-advisoryx_refsource_HP
http://secunia.com/advisories/15779 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20641 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20679 third-party-advisoryx_refsource_SECUNIA
http://www.osvdb.org/26197 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/21042 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/21160 third-party-advisoryx_refsource_SECUNIA
http://www-1.ibm.com/support/search.wss?rs=0&q=IY… vendor-advisoryx_refsource_AIXAPAR
http://www.securityfocus.com/archive/1/438330/100… mailing-listx_refsource_BUGTRAQ
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:03:28.441Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "IY85415",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
          },
          {
            "name": "HPSBTU02116",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
          },
          {
            "name": "DSA-1155",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1155"
          },
          {
            "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata38.html#sendmail2"
          },
          {
            "name": "20684",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20684"
          },
          {
            "name": "HPSBUX02124",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
          },
          {
            "name": "ADV-2006-2388",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2388"
          },
          {
            "name": "20726",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20726"
          },
          {
            "name": "oval:org.mitre.oval:def:11253",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
          },
          {
            "name": "ADV-2006-2351",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2351"
          },
          {
            "name": "21327",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21327"
          },
          {
            "name": "RHSA-2006:0515",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
          },
          {
            "name": "ADV-2006-2389",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2389"
          },
          {
            "name": "21647",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21647"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://issues.rpath.com/browse/RPL-526"
          },
          {
            "name": "20651",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20651"
          },
          {
            "name": "20683",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20683"
          },
          {
            "name": "20650",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20650"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
          },
          {
            "name": "20782",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20782"
          },
          {
            "name": "ADV-2006-3135",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/3135"
          },
          {
            "name": "1016295",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016295"
          },
          {
            "name": "20694",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20694"
          },
          {
            "name": "20473",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20473"
          },
          {
            "name": "ADV-2006-2189",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2189"
          },
          {
            "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
          },
          {
            "name": "20060601-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
          },
          {
            "name": "ADV-2006-2798",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2798"
          },
          {
            "name": "102460",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
          },
          {
            "name": "20060602-01-U",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
          },
          {
            "name": "MDKSA-2006:104",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
          },
          {
            "name": "sendmail-multipart-mime-dos(27128)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
          },
          {
            "name": "20673",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20673"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
          },
          {
            "name": "20060621 Re: Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
          },
          {
            "name": "21612",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21612"
          },
          {
            "name": "20654",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20654"
          },
          {
            "name": "ADV-2006-2390",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2390"
          },
          {
            "name": "SSA:2006-166-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
          },
          {
            "name": "GLSA-200606-19",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
          },
          {
            "name": "18433",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18433"
          },
          {
            "name": "20675",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20675"
          },
          {
            "name": "SUSE-SA:2006:032",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
          },
          {
            "name": "FreeBSD-SA-06:17.sendmail",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
          },
          {
            "name": "20060620 Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
          },
          {
            "name": "SSRT061159",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
          },
          {
            "name": "VU#146718",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/146718"
          },
          {
            "name": "SSRT061135",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
          },
          {
            "name": "15779",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/15779"
          },
          {
            "name": "20641",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20641"
          },
          {
            "name": "20679",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20679"
          },
          {
            "name": "26197",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/26197"
          },
          {
            "name": "21042",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21042"
          },
          {
            "name": "21160",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21160"
          },
          {
            "name": "IY85930",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
          },
          {
            "name": "20060624 Re: Sendmail MIME DoS vulnerability",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-06-06T04:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-18T18:57:01.000Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "IY85415",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
        },
        {
          "name": "HPSBTU02116",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
        },
        {
          "name": "DSA-1155",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1155"
        },
        {
          "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata38.html#sendmail2"
        },
        {
          "name": "20684",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20684"
        },
        {
          "name": "HPSBUX02124",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
        },
        {
          "name": "ADV-2006-2388",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2388"
        },
        {
          "name": "20726",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20726"
        },
        {
          "name": "oval:org.mitre.oval:def:11253",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
        },
        {
          "name": "ADV-2006-2351",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2351"
        },
        {
          "name": "21327",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21327"
        },
        {
          "name": "RHSA-2006:0515",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
        },
        {
          "name": "ADV-2006-2389",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2389"
        },
        {
          "name": "21647",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21647"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://issues.rpath.com/browse/RPL-526"
        },
        {
          "name": "20651",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20651"
        },
        {
          "name": "20683",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20683"
        },
        {
          "name": "20650",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20650"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
        },
        {
          "name": "20782",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20782"
        },
        {
          "name": "ADV-2006-3135",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/3135"
        },
        {
          "name": "1016295",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016295"
        },
        {
          "name": "20694",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20694"
        },
        {
          "name": "20473",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20473"
        },
        {
          "name": "ADV-2006-2189",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2189"
        },
        {
          "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
        },
        {
          "name": "20060601-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
        },
        {
          "name": "ADV-2006-2798",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2798"
        },
        {
          "name": "102460",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
        },
        {
          "name": "20060602-01-U",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
        },
        {
          "name": "MDKSA-2006:104",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
        },
        {
          "name": "sendmail-multipart-mime-dos(27128)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
        },
        {
          "name": "20673",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20673"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
        },
        {
          "name": "20060621 Re: Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
        },
        {
          "name": "21612",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21612"
        },
        {
          "name": "20654",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20654"
        },
        {
          "name": "ADV-2006-2390",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2390"
        },
        {
          "name": "SSA:2006-166-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
        },
        {
          "name": "GLSA-200606-19",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
        },
        {
          "name": "18433",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18433"
        },
        {
          "name": "20675",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20675"
        },
        {
          "name": "SUSE-SA:2006:032",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
        },
        {
          "name": "FreeBSD-SA-06:17.sendmail",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
        },
        {
          "name": "20060620 Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
        },
        {
          "name": "SSRT061159",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
        },
        {
          "name": "VU#146718",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/146718"
        },
        {
          "name": "SSRT061135",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
        },
        {
          "name": "15779",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/15779"
        },
        {
          "name": "20641",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20641"
        },
        {
          "name": "20679",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20679"
        },
        {
          "name": "26197",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/26197"
        },
        {
          "name": "21042",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21042"
        },
        {
          "name": "21160",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21160"
        },
        {
          "name": "IY85930",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
        },
        {
          "name": "20060624 Re: Sendmail MIME DoS vulnerability",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2006-1173",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "IY85415",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85415\u0026apar=only"
            },
            {
              "name": "HPSBTU02116",
              "refsource": "HP",
              "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
            },
            {
              "name": "DSA-1155",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1155"
            },
            {
              "name": "[3.8] 008: SECURITY FIX: June 15, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata38.html#sendmail2"
            },
            {
              "name": "20684",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20684"
            },
            {
              "name": "HPSBUX02124",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
            },
            {
              "name": "ADV-2006-2388",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2388"
            },
            {
              "name": "20726",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20726"
            },
            {
              "name": "oval:org.mitre.oval:def:11253",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253"
            },
            {
              "name": "ADV-2006-2351",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2351"
            },
            {
              "name": "21327",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21327"
            },
            {
              "name": "RHSA-2006:0515",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html"
            },
            {
              "name": "ADV-2006-2389",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2389"
            },
            {
              "name": "21647",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21647"
            },
            {
              "name": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html",
              "refsource": "CONFIRM",
              "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html"
            },
            {
              "name": "https://issues.rpath.com/browse/RPL-526",
              "refsource": "CONFIRM",
              "url": "https://issues.rpath.com/browse/RPL-526"
            },
            {
              "name": "20651",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20651"
            },
            {
              "name": "20683",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20683"
            },
            {
              "name": "20650",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20650"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm"
            },
            {
              "name": "20782",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20782"
            },
            {
              "name": "ADV-2006-3135",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/3135"
            },
            {
              "name": "1016295",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016295"
            },
            {
              "name": "20694",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20694"
            },
            {
              "name": "20473",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20473"
            },
            {
              "name": "ADV-2006-2189",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2189"
            },
            {
              "name": "20060721 rPSA-2006-0134-1 sendmail sendmail-cf",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded"
            },
            {
              "name": "20060601-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P"
            },
            {
              "name": "ADV-2006-2798",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2798"
            },
            {
              "name": "102460",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1"
            },
            {
              "name": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc"
            },
            {
              "name": "20060602-01-U",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc"
            },
            {
              "name": "MDKSA-2006:104",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104"
            },
            {
              "name": "sendmail-multipart-mime-dos(27128)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128"
            },
            {
              "name": "20673",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20673"
            },
            {
              "name": "http://www.f-secure.com/security/fsc-2006-5.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.f-secure.com/security/fsc-2006-5.shtml"
            },
            {
              "name": "20060621 Re: Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded"
            },
            {
              "name": "21612",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21612"
            },
            {
              "name": "20654",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20654"
            },
            {
              "name": "ADV-2006-2390",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2390"
            },
            {
              "name": "SSA:2006-166-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.631382"
            },
            {
              "name": "GLSA-200606-19",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml"
            },
            {
              "name": "18433",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18433"
            },
            {
              "name": "20675",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20675"
            },
            {
              "name": "SUSE-SA:2006:032",
              "refsource": "SUSE",
              "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html"
            },
            {
              "name": "FreeBSD-SA-06:17.sendmail",
              "refsource": "FREEBSD",
              "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc"
            },
            {
              "name": "20060620 Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded"
            },
            {
              "name": "SSRT061159",
              "refsource": "HP",
              "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded"
            },
            {
              "name": "VU#146718",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/146718"
            },
            {
              "name": "SSRT061135",
              "refsource": "HP",
              "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
            },
            {
              "name": "15779",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/15779"
            },
            {
              "name": "20641",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20641"
            },
            {
              "name": "20679",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20679"
            },
            {
              "name": "26197",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/26197"
            },
            {
              "name": "21042",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21042"
            },
            {
              "name": "21160",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21160"
            },
            {
              "name": "IY85930",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY85930\u0026apar=only"
            },
            {
              "name": "20060624 Re: Sendmail MIME DoS vulnerability",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2006-1173",
    "datePublished": "2006-06-08T03:00:00.000Z",
    "dateReserved": "2006-03-12T05:00:00.000Z",
    "dateUpdated": "2024-08-07T17:03:28.441Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2006-0058 (GCVE-0-2006-0058)

Vulnerability from cvelistv5 – Published: 2006-03-23 01:00 – Updated: 2024-08-07 16:18
VLAI?
Summary
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://www.vupen.com/english/advisories/2006/1529 vdb-entryx_refsource_VUPEN
http://itrc.hp.com/service/cki/docDisplay.do?docI… vendor-advisoryx_refsource_HP
http://secunia.com/advisories/19450 third-party-advisoryx_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1015 vendor-advisoryx_refsource_DEBIAN
http://www.mandriva.com/security/advisories?name=… vendor-advisoryx_refsource_MANDRIVA
http://www14.software.ibm.com/webapp/set2/sas/f/h… x_refsource_CONFIRM
http://www.openbsd.org/errata38.html#sendmail vendor-advisoryx_refsource_OPENBSD
http://www.kb.cert.org/vuls/id/834865 third-party-advisoryx_refsource_CERT-VN
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006… vendor-advisoryx_refsource_SCO
http://secunia.com/advisories/19342 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/1049 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/19774 third-party-advisoryx_refsource_SECUNIA
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories… vendor-advisoryx_refsource_FREEBSD
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/19404 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/19367 third-party-advisoryx_refsource_SECUNIA
http://www.openpkg.org/security/advisories/OpenPK… vendor-advisoryx_refsource_OPENPKG
http://www.vupen.com/english/advisories/2006/1051 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/428536/100… mailing-listx_refsource_BUGTRAQ
http://www.f-secure.com/security/fsc-2006-2.shtml x_refsource_CONFIRM
http://securityreason.com/securityalert/743 third-party-advisoryx_refsource_SREASON
http://securitytracker.com/id?1015801 vdb-entryx_refsource_SECTRACK
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://secunia.com/advisories/19363 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.us-cert.gov/cas/techalerts/TA06-081A.html third-party-advisoryx_refsource_CERT
http://secunia.com/advisories/20723 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/20243 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/19407 third-party-advisoryx_refsource_SECUNIA
http://www.vupen.com/english/advisories/2006/2189 vdb-entryx_refsource_VUPEN
http://www.redhat.com/archives/fedora-announce-li… vendor-advisoryx_refsource_FEDORA
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.iss.net/threats/216.html third-party-advisoryx_refsource_ISS
http://secunia.com/advisories/19466 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/19368 third-party-advisoryx_refsource_SECUNIA
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://www.ciac.org/ciac/bulletins/q-151.shtml third-party-advisorygovernment-resourcex_refsource_CIAC
http://h20000.www2.hp.com/bizsupport/TechSupport/… vendor-advisoryx_refsource_HP
http://support.avaya.com/elmodocs2/security/ASA-2… x_refsource_CONFIRM
http://secunia.com/advisories/19345 third-party-advisoryx_refsource_SECUNIA
http://securityreason.com/securityalert/612 third-party-advisoryx_refsource_SREASON
http://www.redhat.com/archives/fedora-announce-li… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/19346 third-party-advisoryx_refsource_SECUNIA
http://slackware.com/security/viewer.php?l=slackw… vendor-advisoryx_refsource_SLACKWARE
http://www-1.ibm.com/support/search.wss?rs=0&q=IY… vendor-advisoryx_refsource_AIXAPAR
http://www14.software.ibm.com/webapp/set2/subscri… x_refsource_CONFIRM
http://www.gentoo.org/security/en/glsa/glsa-20060… vendor-advisoryx_refsource_GENTOO
http://www-1.ibm.com/support/search.wss?rs=0&q=IY… vendor-advisoryx_refsource_AIXAPAR
http://www-1.ibm.com/support/search.wss?rs=0&q=IY… vendor-advisoryx_refsource_AIXAPAR
http://www.vupen.com/english/advisories/2006/1068 vdb-entryx_refsource_VUPEN
http://www.redhat.com/support/errata/RHSA-2006-02… vendor-advisoryx_refsource_REDHAT
http://www.vupen.com/english/advisories/2006/2490 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/1072 vdb-entryx_refsource_VUPEN
http://www.securityfocus.com/archive/1/428656/100… vendor-advisoryx_refsource_FEDORA
http://secunia.com/advisories/19360 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/19532 third-party-advisoryx_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/19361 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/19676 third-party-advisoryx_refsource_SECUNIA
http://secunia.com/advisories/19356 third-party-advisoryx_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2… vendor-advisoryx_refsource_SUSE
http://www.osvdb.org/24037 vdb-entryx_refsource_OSVDB
http://secunia.com/advisories/19349 third-party-advisoryx_refsource_SECUNIA
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://secunia.com/advisories/19394 third-party-advisoryx_refsource_SECUNIA
http://itrc.hp.com/service/cki/docDisplay.do?docI… vendor-advisoryx_refsource_HP
http://www.vupen.com/english/advisories/2006/1139 vdb-entryx_refsource_VUPEN
http://www.vupen.com/english/advisories/2006/1157 vdb-entryx_refsource_VUPEN
http://secunia.com/advisories/19533 third-party-advisoryx_refsource_SECUNIA
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
ftp://ftp.netbsd.org/pub/NetBSD/security/advisori… vendor-advisoryx_refsource_NETBSD
http://www.securityfocus.com/bid/17192 vdb-entryx_refsource_BID
http://www.redhat.com/support/errata/RHSA-2006-02… vendor-advisoryx_refsource_REDHAT
http://www.sendmail.com/company/advisory/index.shtml x_refsource_CONFIRM
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T16:18:20.809Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "ADV-2006-1529",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1529"
          },
          {
            "name": "HPSBTU02116",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
          },
          {
            "name": "19450",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19450"
          },
          {
            "name": "DSA-1015",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1015"
          },
          {
            "name": "MDKSA-2006:058",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:058"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688"
          },
          {
            "name": "[3.8] 006: SECURITY FIX: March 25, 2006",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENBSD",
              "x_transferred"
            ],
            "url": "http://www.openbsd.org/errata38.html#sendmail"
          },
          {
            "name": "VU#834865",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/834865"
          },
          {
            "name": "SCOSA-2006.24",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.24/SCOSA-2006.24.txt"
          },
          {
            "name": "19342",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19342"
          },
          {
            "name": "ADV-2006-1049",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1049"
          },
          {
            "name": "19774",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19774"
          },
          {
            "name": "FreeBSD-SA-06:13",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc"
          },
          {
            "name": "oval:org.mitre.oval:def:11074",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11074"
          },
          {
            "name": "20060401-01-U",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
          },
          {
            "name": "200494",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200494-1"
          },
          {
            "name": "19404",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19404"
          },
          {
            "name": "19367",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19367"
          },
          {
            "name": "OpenPKG-SA-2006.007",
            "tags": [
              "vendor-advisory",
              "x_refsource_OPENPKG",
              "x_transferred"
            ],
            "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.007-sendmail.html"
          },
          {
            "name": "ADV-2006-1051",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1051"
          },
          {
            "name": "20060322 sendmail vuln advisories (CVE-2006-0058)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/428536/100/0/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.f-secure.com/security/fsc-2006-2.shtml"
          },
          {
            "name": "743",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/743"
          },
          {
            "name": "1015801",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1015801"
          },
          {
            "name": "HPSBUX02108",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00629555"
          },
          {
            "name": "19363",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19363"
          },
          {
            "name": "smtp-timeout-bo(24584)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24584"
          },
          {
            "name": "TA06-081A",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.us-cert.gov/cas/techalerts/TA06-081A.html"
          },
          {
            "name": "20723",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20723"
          },
          {
            "name": "20243",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20243"
          },
          {
            "name": "19407",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19407"
          },
          {
            "name": "ADV-2006-2189",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2189"
          },
          {
            "name": "FEDORA-2006-194",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00017.html"
          },
          {
            "name": "20060302-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20060302-01-P"
          },
          {
            "name": "20060322 Sendmail Remote Signal Handling Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_ISS",
              "x_transferred"
            ],
            "url": "http://www.iss.net/threats/216.html"
          },
          {
            "name": "19466",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19466"
          },
          {
            "name": "19368",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19368"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm"
          },
          {
            "name": "Q-151",
            "tags": [
              "third-party-advisory",
              "government-resource",
              "x_refsource_CIAC",
              "x_transferred"
            ],
            "url": "http://www.ciac.org/ciac/bulletins/q-151.shtml"
          },
          {
            "name": "SSRT061133",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00629555"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-074.htm"
          },
          {
            "name": "19345",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19345"
          },
          {
            "name": "612",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/612"
          },
          {
            "name": "FEDORA-2006-193",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00018.html"
          },
          {
            "name": "19346",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19346"
          },
          {
            "name": "SSA:2006-081-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_SLACKWARE",
              "x_transferred"
            ],
            "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.619600"
          },
          {
            "name": "IY82992",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY82992\u0026apar=only"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751"
          },
          {
            "name": "GLSA-200603-21",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml"
          },
          {
            "name": "IY82994",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY82994\u0026apar=only"
          },
          {
            "name": "IY82993",
            "tags": [
              "vendor-advisory",
              "x_refsource_AIXAPAR",
              "x_transferred"
            ],
            "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY82993\u0026apar=only"
          },
          {
            "name": "ADV-2006-1068",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1068"
          },
          {
            "name": "RHSA-2006:0265",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0265.html"
          },
          {
            "name": "ADV-2006-2490",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2490"
          },
          {
            "name": "ADV-2006-1072",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1072"
          },
          {
            "name": "FLSA:186277",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/428656/100/0/threaded"
          },
          {
            "name": "19360",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19360"
          },
          {
            "name": "19532",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19532"
          },
          {
            "name": "102324",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102324-1"
          },
          {
            "name": "19361",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19361"
          },
          {
            "name": "19676",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19676"
          },
          {
            "name": "19356",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19356"
          },
          {
            "name": "SUSE-SA:2006:017",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2006_17_sendmail.html"
          },
          {
            "name": "24037",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/24037"
          },
          {
            "name": "19349",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19349"
          },
          {
            "name": "102262",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102262-1"
          },
          {
            "name": "19394",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19394"
          },
          {
            "name": "SSRT061135",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
          },
          {
            "name": "ADV-2006-1139",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1139"
          },
          {
            "name": "ADV-2006-1157",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/1157"
          },
          {
            "name": "19533",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/19533"
          },
          {
            "name": "oval:org.mitre.oval:def:1689",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1689"
          },
          {
            "name": "NetBSD-SA2006-010",
            "tags": [
              "vendor-advisory",
              "x_refsource_NETBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-010.txt.asc"
          },
          {
            "name": "17192",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/17192"
          },
          {
            "name": "RHSA-2006:0264",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2006-0264.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.com/company/advisory/index.shtml"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-03-22T05:00:00.000Z",
      "descriptions": [
        {
          "lang": "en",
          "value": "Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T18:57:01.000Z",
        "orgId": "37e5125f-f79b-445b-8fad-9564f167944b",
        "shortName": "certcc"
      },
      "references": [
        {
          "name": "ADV-2006-1529",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1529"
        },
        {
          "name": "HPSBTU02116",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
        },
        {
          "name": "19450",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19450"
        },
        {
          "name": "DSA-1015",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1015"
        },
        {
          "name": "MDKSA-2006:058",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:058"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688"
        },
        {
          "name": "[3.8] 006: SECURITY FIX: March 25, 2006",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENBSD"
          ],
          "url": "http://www.openbsd.org/errata38.html#sendmail"
        },
        {
          "name": "VU#834865",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/834865"
        },
        {
          "name": "SCOSA-2006.24",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.24/SCOSA-2006.24.txt"
        },
        {
          "name": "19342",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19342"
        },
        {
          "name": "ADV-2006-1049",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1049"
        },
        {
          "name": "19774",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19774"
        },
        {
          "name": "FreeBSD-SA-06:13",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc"
        },
        {
          "name": "oval:org.mitre.oval:def:11074",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11074"
        },
        {
          "name": "20060401-01-U",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
        },
        {
          "name": "200494",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200494-1"
        },
        {
          "name": "19404",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19404"
        },
        {
          "name": "19367",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19367"
        },
        {
          "name": "OpenPKG-SA-2006.007",
          "tags": [
            "vendor-advisory",
            "x_refsource_OPENPKG"
          ],
          "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.007-sendmail.html"
        },
        {
          "name": "ADV-2006-1051",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1051"
        },
        {
          "name": "20060322 sendmail vuln advisories (CVE-2006-0058)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/428536/100/0/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.f-secure.com/security/fsc-2006-2.shtml"
        },
        {
          "name": "743",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/743"
        },
        {
          "name": "1015801",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1015801"
        },
        {
          "name": "HPSBUX02108",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00629555"
        },
        {
          "name": "19363",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19363"
        },
        {
          "name": "smtp-timeout-bo(24584)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24584"
        },
        {
          "name": "TA06-081A",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.us-cert.gov/cas/techalerts/TA06-081A.html"
        },
        {
          "name": "20723",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20723"
        },
        {
          "name": "20243",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20243"
        },
        {
          "name": "19407",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19407"
        },
        {
          "name": "ADV-2006-2189",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2189"
        },
        {
          "name": "FEDORA-2006-194",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00017.html"
        },
        {
          "name": "20060302-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20060302-01-P"
        },
        {
          "name": "20060322 Sendmail Remote Signal Handling Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_ISS"
          ],
          "url": "http://www.iss.net/threats/216.html"
        },
        {
          "name": "19466",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19466"
        },
        {
          "name": "19368",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19368"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm"
        },
        {
          "name": "Q-151",
          "tags": [
            "third-party-advisory",
            "government-resource",
            "x_refsource_CIAC"
          ],
          "url": "http://www.ciac.org/ciac/bulletins/q-151.shtml"
        },
        {
          "name": "SSRT061133",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00629555"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-074.htm"
        },
        {
          "name": "19345",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19345"
        },
        {
          "name": "612",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/612"
        },
        {
          "name": "FEDORA-2006-193",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00018.html"
        },
        {
          "name": "19346",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19346"
        },
        {
          "name": "SSA:2006-081-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_SLACKWARE"
          ],
          "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.619600"
        },
        {
          "name": "IY82992",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY82992\u0026apar=only"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751"
        },
        {
          "name": "GLSA-200603-21",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml"
        },
        {
          "name": "IY82994",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY82994\u0026apar=only"
        },
        {
          "name": "IY82993",
          "tags": [
            "vendor-advisory",
            "x_refsource_AIXAPAR"
          ],
          "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY82993\u0026apar=only"
        },
        {
          "name": "ADV-2006-1068",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1068"
        },
        {
          "name": "RHSA-2006:0265",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0265.html"
        },
        {
          "name": "ADV-2006-2490",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2490"
        },
        {
          "name": "ADV-2006-1072",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1072"
        },
        {
          "name": "FLSA:186277",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "http://www.securityfocus.com/archive/1/428656/100/0/threaded"
        },
        {
          "name": "19360",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19360"
        },
        {
          "name": "19532",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19532"
        },
        {
          "name": "102324",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102324-1"
        },
        {
          "name": "19361",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19361"
        },
        {
          "name": "19676",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19676"
        },
        {
          "name": "19356",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19356"
        },
        {
          "name": "SUSE-SA:2006:017",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2006_17_sendmail.html"
        },
        {
          "name": "24037",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/24037"
        },
        {
          "name": "19349",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19349"
        },
        {
          "name": "102262",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102262-1"
        },
        {
          "name": "19394",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19394"
        },
        {
          "name": "SSRT061135",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
        },
        {
          "name": "ADV-2006-1139",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1139"
        },
        {
          "name": "ADV-2006-1157",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/1157"
        },
        {
          "name": "19533",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/19533"
        },
        {
          "name": "oval:org.mitre.oval:def:1689",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1689"
        },
        {
          "name": "NetBSD-SA2006-010",
          "tags": [
            "vendor-advisory",
            "x_refsource_NETBSD"
          ],
          "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-010.txt.asc"
        },
        {
          "name": "17192",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/17192"
        },
        {
          "name": "RHSA-2006:0264",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2006-0264.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.com/company/advisory/index.shtml"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cert@cert.org",
          "ID": "CVE-2006-0058",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "ADV-2006-1529",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1529"
            },
            {
              "name": "HPSBTU02116",
              "refsource": "HP",
              "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
            },
            {
              "name": "19450",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19450"
            },
            {
              "name": "DSA-1015",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1015"
            },
            {
              "name": "MDKSA-2006:058",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:058"
            },
            {
              "name": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688",
              "refsource": "CONFIRM",
              "url": "http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688"
            },
            {
              "name": "[3.8] 006: SECURITY FIX: March 25, 2006",
              "refsource": "OPENBSD",
              "url": "http://www.openbsd.org/errata38.html#sendmail"
            },
            {
              "name": "VU#834865",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/834865"
            },
            {
              "name": "SCOSA-2006.24",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.24/SCOSA-2006.24.txt"
            },
            {
              "name": "19342",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19342"
            },
            {
              "name": "ADV-2006-1049",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1049"
            },
            {
              "name": "19774",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19774"
            },
            {
              "name": "FreeBSD-SA-06:13",
              "refsource": "FREEBSD",
              "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc"
            },
            {
              "name": "oval:org.mitre.oval:def:11074",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11074"
            },
            {
              "name": "20060401-01-U",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U"
            },
            {
              "name": "200494",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-66-200494-1"
            },
            {
              "name": "19404",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19404"
            },
            {
              "name": "19367",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19367"
            },
            {
              "name": "OpenPKG-SA-2006.007",
              "refsource": "OPENPKG",
              "url": "http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.007-sendmail.html"
            },
            {
              "name": "ADV-2006-1051",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1051"
            },
            {
              "name": "20060322 sendmail vuln advisories (CVE-2006-0058)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/428536/100/0/threaded"
            },
            {
              "name": "http://www.f-secure.com/security/fsc-2006-2.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.f-secure.com/security/fsc-2006-2.shtml"
            },
            {
              "name": "743",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/743"
            },
            {
              "name": "1015801",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1015801"
            },
            {
              "name": "HPSBUX02108",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00629555"
            },
            {
              "name": "19363",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19363"
            },
            {
              "name": "smtp-timeout-bo(24584)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/24584"
            },
            {
              "name": "TA06-081A",
              "refsource": "CERT",
              "url": "http://www.us-cert.gov/cas/techalerts/TA06-081A.html"
            },
            {
              "name": "20723",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20723"
            },
            {
              "name": "20243",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20243"
            },
            {
              "name": "19407",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19407"
            },
            {
              "name": "ADV-2006-2189",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2189"
            },
            {
              "name": "FEDORA-2006-194",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00017.html"
            },
            {
              "name": "20060302-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20060302-01-P"
            },
            {
              "name": "20060322 Sendmail Remote Signal Handling Vulnerability",
              "refsource": "ISS",
              "url": "http://www.iss.net/threats/216.html"
            },
            {
              "name": "19466",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19466"
            },
            {
              "name": "19368",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19368"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm"
            },
            {
              "name": "Q-151",
              "refsource": "CIAC",
              "url": "http://www.ciac.org/ciac/bulletins/q-151.shtml"
            },
            {
              "name": "SSRT061133",
              "refsource": "HP",
              "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c00629555"
            },
            {
              "name": "http://support.avaya.com/elmodocs2/security/ASA-2006-074.htm",
              "refsource": "CONFIRM",
              "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-074.htm"
            },
            {
              "name": "19345",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19345"
            },
            {
              "name": "612",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/612"
            },
            {
              "name": "FEDORA-2006-193",
              "refsource": "FEDORA",
              "url": "http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00018.html"
            },
            {
              "name": "19346",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19346"
            },
            {
              "name": "SSA:2006-081-01",
              "refsource": "SLACKWARE",
              "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.619600"
            },
            {
              "name": "IY82992",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY82992\u0026apar=only"
            },
            {
              "name": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751",
              "refsource": "CONFIRM",
              "url": "http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18\u0026ID=2751"
            },
            {
              "name": "GLSA-200603-21",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml"
            },
            {
              "name": "IY82994",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY82994\u0026apar=only"
            },
            {
              "name": "IY82993",
              "refsource": "AIXAPAR",
              "url": "http://www-1.ibm.com/support/search.wss?rs=0\u0026q=IY82993\u0026apar=only"
            },
            {
              "name": "ADV-2006-1068",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1068"
            },
            {
              "name": "RHSA-2006:0265",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2006-0265.html"
            },
            {
              "name": "ADV-2006-2490",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2490"
            },
            {
              "name": "ADV-2006-1072",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1072"
            },
            {
              "name": "FLSA:186277",
              "refsource": "FEDORA",
              "url": "http://www.securityfocus.com/archive/1/428656/100/0/threaded"
            },
            {
              "name": "19360",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19360"
            },
            {
              "name": "19532",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19532"
            },
            {
              "name": "102324",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102324-1"
            },
            {
              "name": "19361",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19361"
            },
            {
              "name": "19676",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19676"
            },
            {
              "name": "19356",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19356"
            },
            {
              "name": "SUSE-SA:2006:017",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2006_17_sendmail.html"
            },
            {
              "name": "24037",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/24037"
            },
            {
              "name": "19349",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19349"
            },
            {
              "name": "102262",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102262-1"
            },
            {
              "name": "19394",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19394"
            },
            {
              "name": "SSRT061135",
              "refsource": "HP",
              "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635"
            },
            {
              "name": "ADV-2006-1139",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1139"
            },
            {
              "name": "ADV-2006-1157",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/1157"
            },
            {
              "name": "19533",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/19533"
            },
            {
              "name": "oval:org.mitre.oval:def:1689",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1689"
            },
            {
              "name": "NetBSD-SA2006-010",
              "refsource": "NETBSD",
              "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-010.txt.asc"
            },
            {
              "name": "17192",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/17192"
            },
            {
              "name": "RHSA-2006:0264",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2006-0264.html"
            },
            {
              "name": "http://www.sendmail.com/company/advisory/index.shtml",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.com/company/advisory/index.shtml"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "37e5125f-f79b-445b-8fad-9564f167944b",
    "assignerShortName": "certcc",
    "cveId": "CVE-2006-0058",
    "datePublished": "2006-03-23T01:00:00.000Z",
    "dateReserved": "2006-01-01T05:00:00.000Z",
    "dateUpdated": "2024-08-07T16:18:20.809Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CERTA-2006-ALE-003

Vulnerability from certfr_alerte - Published: 2006-03-24 - Updated: 2006-03-24

Une vulnérabilité dans le logiciel de messagerie Sendmail permet à un utilisateur distant mal intentionné d'exécuter du code arbitraire à distance. Le fort déploiement de Sendmail combiné à la gravité de la faille a conduit le CERTA à augmenter le niveau de vigilence au niveau d'alerte, en plus de l'avis CERTA-2006-AVI-124 publié la jeudi 23 mars 2006.
L'objectif de cette alerte est de sensibiliser les utilisateurs à la nécessité d'appliquer les correctifs en fonction des systèmes concernés.

Description

Sendmail est un logiciel de routage de messages électroniques (Mail Transport Agent ou MTA).
Une vulnérabilité dans la gestion de messages asynchrones par le logiciel Sendmail permet à un utilisateur distant mal intentionné d'exécuter du code arbitraire à distance sur la machine vulnérable.

Solution

Mettre à jour Sendmail en version 8.13.6. En plus de ce problème de sécurité, Sendmail version 8.13.6 corrige d'autres problèmes de sécurité et d'autres faiblesses dans le code. Sendmail 8.13.6 peut se télécharger à l'adresse suivante :

http://www.sendmail.org/8.13.6.html

Si la mise à jour de Sendmail en version 8.13.6 n'est paspossible, appliquer les correctifs pour Sendmail 8.12.11 et 8.13.5.Les correctifs sont disponibles aux adresses suivantes :

ftp://ftp.sendmail.org/pub/sendmail/8.12.11.p0

ftp://ftp.sendmail.org/pub/sendmail/8.13.5.p0

Dans tous les cas, se référer au bulletin de sécurité del'éditeur pour l'obtention des correctifs (cf. sectionDocumentation).

None
Impacted products
Vendor Product Description
Sendmail sendmail Pour la branche 8.12.x, Sendmail version 8.12.11 et versions antérieures ;
Sendmail sendmail pour la branche 8.13.x, Sendmail version 8.13.5 et versions antérieures.
References

Show details on source website

{
  "$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
  "affected_systems": [
    {
      "description": "Pour la branche 8.12.x, Sendmail version 8.12.11 et versions ant\u00e9rieures ;",
      "product": {
        "name": "sendmail",
        "vendor": {
          "name": "Sendmail",
          "scada": false
        }
      }
    },
    {
      "description": "pour la branche 8.13.x, Sendmail version 8.13.5 et versions ant\u00e9rieures.",
      "product": {
        "name": "sendmail",
        "vendor": {
          "name": "Sendmail",
          "scada": false
        }
      }
    }
  ],
  "affected_systems_content": null,
  "closed_at": "2006-03-24",
  "content": "## Description\n\nSendmail est un logiciel de routage de messages \u00e9lectroniques (Mail\nTransport Agent ou MTA).  \nUne vuln\u00e9rabilit\u00e9 dans la gestion de messages asynchrones par le\nlogiciel Sendmail permet \u00e0 un utilisateur distant mal intentionn\u00e9\nd\u0027ex\u00e9cuter du code arbitraire \u00e0 distance sur la machine vuln\u00e9rable.\n\n## Solution\n\nMettre \u00e0 jour Sendmail en version 8.13.6. En plus de ce probl\u00e8me de\ns\u00e9curit\u00e9, Sendmail version 8.13.6 corrige d\u0027autres probl\u00e8mes de s\u00e9curit\u00e9\net d\u0027autres faiblesses dans le code. Sendmail 8.13.6 peut se t\u00e9l\u00e9charger\n\u00e0 l\u0027adresse suivante :\n\n    http://www.sendmail.org/8.13.6.html\n\nSi la mise \u00e0 jour de Sendmail en version 8.13.6 n\u0027est paspossible,\nappliquer les correctifs pour Sendmail 8.12.11 et 8.13.5.Les correctifs\nsont disponibles aux adresses suivantes :\n\n    ftp://ftp.sendmail.org/pub/sendmail/8.12.11.p0\n\n    ftp://ftp.sendmail.org/pub/sendmail/8.13.5.p0\n\nDans tous les cas, se r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 del\u0027\u00e9diteur pour\nl\u0027obtention des correctifs (cf. sectionDocumentation).\n",
  "cves": [
    {
      "name": "CVE-2006-0058",
      "url": "https://www.cve.org/CVERecord?id=CVE-2006-0058"
    }
  ],
  "initial_release_date": "2006-03-24T00:00:00",
  "last_revision_date": "2006-03-24T00:00:00",
  "links": [
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 pour Fedora du 22 mars 2006 :",
      "url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/4/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Debian DSA-1015 du 23 mars 2006 :",
      "url": "http://www.debian.org/security/2006/dsa-1015"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Gentoo GLSA-200603-21 du 22 mars 2006    :",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Mandriva MDKSA-2006:058 du 22 mars    2006 :",
      "url": "http://wwwnew.mandriva.com/security/advisories?name=MDKSA-2006:058"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 ISS du 22 mars 2006 :",
      "url": "http://xforce.iss.net/xforce/alerts/id/216"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM AIX du 23 mars 2006 :",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY82992"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM AIX du 23 mars 2006 :",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY82994"
    },
    {
      "title": "Site Internet de Sendmail :",
      "url": "http://www.sendmail.com"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0265 du 22 mars 2006    :",
      "url": "http://rhn.redhat.com/errata/RHSA-2006-0265.html"
    },
    {
      "title": "Alerte de s\u00e9curit\u00e9 de l\u0027US-CERT TA06-081A et VU#834865 du    22 mars 2006 :",
      "url": "http://www.us-cert.gov/cas/techalerts/TA06-081A.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 RedHat RHSA-2006:0264 du 22 mars 2006    :",
      "url": "http://rhn.redhat.com/errata/RHSA-2006-0264.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 IBM AIX du 23 mars 2006 :",
      "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY82993"
    },
    {
      "title": "Page Internet de la version 8.13.6 de Sendmail :",
      "url": "http://www.sendmail.org/8.13.6.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 CERTA-2006-AVI-124 du jeudi 23 mars    2006 :",
      "url": "http://www.certa.ssi.gouv.fr/site/CERTA-2006-AVI-124/index.html"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 FreeBSD SA-06:13.sendmail du 22 mars    2006 :",
      "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc"
    },
    {
      "title": "Alerte de s\u00e9curit\u00e9 de l\u0027US-CERT TA06-081A et VU#834865 du    22 mars 2006 :",
      "url": "http://www.kb.cert.org/vuls/id/834865"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Sendmail du 22 mars 2006 :",
      "url": "http://www.sendmail.com/company/advisory/index.shtml"
    },
    {
      "title": "Mises \u00e0 jour de s\u00e9curit\u00e9 pour Fedora du 22 mars 2006 :",
      "url": "http://download.fedora.redhat.com/pub/fedora/linux/core/updates/5/"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Sun Alerte #102262 du 22 mars 2006 :",
      "url": "http://sunsolve.sun.com/search/document.do?assetKey=1-26-102262-1"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 Slackware SSA:2006-081-01 du 22 mars    2003 :",
      "url": "http://slackware.com/security/viewer.php?l=slackware-security\u0026y=2006\u0026m=slackware-security.619600"
    },
    {
      "title": "Bulletin de s\u00e9curit\u00e9 SUSE SuSE-SA:2006:017 du 22 mars 2006    :",
      "url": "http://www.novell.com/linux/security/advisories/2006_17_sendmail.html"
    }
  ],
  "reference": "CERTA-2006-ALE-003",
  "revisions": [
    {
      "description": "version initiale.",
      "revision_date": "2006-03-24T00:00:00.000000"
    }
  ],
  "risks": [
    {
      "description": "D\u00e9ni de service \u00e0 distance"
    },
    {
      "description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
    }
  ],
  "summary": "Une vuln\u00e9rabilit\u00e9 dans le logiciel de messagerie Sendmail permet \u00e0 un\nutilisateur distant mal intentionn\u00e9 d\u0027ex\u00e9cuter du code arbitraire \u00e0\ndistance. Le fort d\u00e9ploiement de Sendmail combin\u00e9 \u00e0 la gravit\u00e9 de la\nfaille a conduit le CERTA \u00e0 augmenter le niveau de vigilence au niveau\nd\u0027alerte, en plus de l\u0027avis CERTA-2006-AVI-124 publi\u00e9 la jeudi 23 mars\n2006.  \n\u003cspan class=\"textbf\"\u003eL\u0027objectif de cette alerte est de sensibiliser les\nutilisateurs \u00e0 la n\u00e9cessit\u00e9 d\u0027appliquer les correctifs en fonction des\nsyst\u00e8mes concern\u00e9s\u003c/span\u003e.\n",
  "title": "Vuln\u00e9rabilit\u00e9 de Sendmail",
  "vendor_advisories": [
    {
      "published_at": null,
      "title": "Bulletin de s\u00e9curit\u00e9 du CERTA CERTA-2006-AVI-124 du 23 mars 2006",
      "url": null
    }
  ]
}