Search criteria

5 vulnerabilities found for sis by hp

VAR-200304-0013

Vulnerability from variot - Updated: 2025-04-03 21:38

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. Sendmail contains a buffer overflow in code that parses email addresses. A remote attacker could execute arbitrary code or cause a denial of service on a vulnerable system. The flaw is present in the 'prescan()' procedure, which is used for processing email addresses in SMTP headers. This vulnerability stems from a logic error in the conversion of a char to an integer value. The issue has been fixed Sendmail 8.12.9. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. Sendmail is one of the most popular MTAs. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\% to 75\% of the total. Many UNIX and Linux workstations run Sendmail by default. This vulnerability exists in the prescan() process. The vulnerability is for messages, not connections. This means that the vulnerability is triggered by the content of a specially crafted email message, rather than by lower-level network communications. This is important because a non-vulnerable MTA can send malicious messages along with other protected MTAs in the network. In other words, even if the software used by the boundary MTA of the site is not sendmail, the sendmail service program with loopholes inside the network is still threatened. Messages that exploit this vulnerability can also pass through many common packet filters or firewalls undetected

Show details on source website

{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200304-0013",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "10.24"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.01"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.10"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.34"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.0.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.30"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.6"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.26"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.16"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.20"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.5"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.4"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "4.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "9.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk3_bl17"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.00"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0_pk4_bl18"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk4_bl18"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "hp-ux series 700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk5_bl19"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b_pk1_bl1"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.5.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0a"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0d_pk9_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0d"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk7_bl18"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.00"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0b"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.08"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0_pk4_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk2_bl2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk3_bl3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.7"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g_pk3_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk6_bl20"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0a_pk3_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "sis",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.09"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk1_bl1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "hp-ux series 800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "8.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0f"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk6_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.0"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "conectiva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mandrakesoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mirapoint",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nortel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sequent ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sendmail consortium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wind river",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wirex",
        "version": null
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.11.6"
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.12.8"
      },
      {
        "model": "cobalt raq4",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raq550",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raqxtr",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "2.6 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "2.6 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "advanced message server",
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.1.x"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.2.x"
      },
      {
        "model": "turbolinux advanced server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.1"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.5"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.0"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.10"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.00"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.11"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.04"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "6.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "8.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "9"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "hp-ux sis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "z/os v1r4",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "os/390 v2r6",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tru64 f pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "consortium sendmail beta10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.2"
      },
      {
        "model": "tru64 pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "mac os",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "nonstop-ux whitney",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.22",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.0"
      },
      {
        "model": "z/os",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "os/390 v2r9",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "solaris x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.9"
      },
      {
        "model": "hp-ux series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20700"
      },
      {
        "model": "advanced workstation for the itanium processor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "z/os v1r2",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "consortium sendmail beta5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.5"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.7"
      },
      {
        "model": "tru64 g pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 d pk9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail beta16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "os/390 v2r8",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "solaris 2.6 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "hp-ux b.11.04",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "aix l",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "solaris 2.4 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "cobalt raq 4100r",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "550"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "tru64 d",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.8"
      },
      {
        "model": "tru64 g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "nonstop-ux puma",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "9"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "tru64 f pk7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "openlinux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "3.1.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "tru64 pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "cobalt qube3 4000wg",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.8"
      },
      {
        "model": "mac os server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "consortium sendmail beta12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "os/390 v2r10",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "altavista firewall avfw98",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "tru64 b pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.9"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "solaris 2.5 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "openlinux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "3.1.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.4"
      },
      {
        "model": "consortium sendmail beta7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "hp-ux b.11.11",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "tru64 a pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux b.11.00",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "solaris 7.0 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "solaris 9 x86 update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2"
      },
      {
        "model": "lx50",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.0"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "alphaserver sc",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "tru64 pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "solaris ppc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "hp-ux series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20800"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "mvs",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "cobalt raq4 3001r",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "cobalt raq xtr 3500r",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "altavista firewall raptor ec",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:ibm:aix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_4",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_550",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_xtr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sun:solaris",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_advanced_message_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_advanced_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_workstation",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:hp-ux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:vvos",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:linux",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michal Zalewski\u203b lcamtuf@dione.ids.pl",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2003-0161",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2003-0161",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-6991",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2003-0161",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#897604",
            "trust": 0.8,
            "value": "67.20"
          },
          {
            "author": "NVD",
            "id": "CVE-2003-0161",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200304-025",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-6991",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2003-0161",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. Sendmail contains a buffer overflow in code that parses email addresses.  A remote attacker could execute arbitrary code or cause a denial of service on a vulnerable system. The flaw is present in the \u0027prescan()\u0027 procedure, which is used for processing email addresses in SMTP headers.  This vulnerability stems from a logic error in the conversion of a char to an integer value. The issue has been fixed Sendmail 8.12.9. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. Sendmail is one of the most popular MTAs. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\\\\% to 75\\\\% of the total. Many UNIX and Linux workstations run Sendmail by default. This vulnerability exists in the prescan() process. The vulnerability is for messages, not connections. This means that the vulnerability is triggered by the content of a specially crafted email message, rather than by lower-level network communications. This is important because a non-vulnerable MTA can send malicious messages along with other protected MTAs in the network. In other words, even if the software used by the boundary MTA of the site is not sendmail, the sendmail service program with loopholes inside the network is still threatened. Messages that exploit this vulnerability can also pass through many common packet filters or firewalls undetected",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      },
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      }
    ],
    "trust": 2.79
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=24",
        "trust": 0.2,
        "type": "exploit"
      },
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-6991",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#897604",
        "trust": 3.7
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "7230",
        "trust": 2.9
      },
      {
        "db": "XF",
        "id": "11653",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025",
        "trust": 0.7
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:121",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:120",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-278",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-290",
        "trust": 0.6
      },
      {
        "db": "SCO",
        "id": "SCOSA-2004.11",
        "trust": 0.6
      },
      {
        "db": "IMMUNIX",
        "id": "IMNX-2003-7+-002-01",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "52620",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "52700",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "1001088",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030329 SENDMAIL 8.12.9 AVAILABLE",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030520 [FWD: 127 RESEARCH AND DEVELOPMENT: 127 DAY!]",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030331 GLSA: SENDMAIL (200303-27)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030329 SENDMAIL: -1 GONE WILD",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030330 [OPENPKG-SA-2003.027] OPENPKG SECURITY ADVISORY (SENDMAIL)",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20030329 SENDMAIL: -1 GONE WILD",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2003-12",
        "trust": 0.6
      },
      {
        "db": "CONECTIVA",
        "id": "CLA-2003:614",
        "trust": 0.6
      },
      {
        "db": "SGI",
        "id": "20030401-01-P",
        "trust": 0.6
      },
      {
        "db": "CALDERA",
        "id": "CSSA-2003-016.0",
        "trust": 0.6
      },
      {
        "db": "GENTOO",
        "id": "GLSA-200303-27",
        "trust": 0.6
      },
      {
        "db": "FREEBSD",
        "id": "FREEBSD-SA-03:07",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "24",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-15232",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-62723",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76244",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "22442",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "id": "VAR-200304-0013",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2025-04-03T21:38:17.829000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HPSBUX00253",
        "trust": 0.8,
        "url": "http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00958571"
      },
      {
        "title": "HPSBUX0304-253",
        "trust": 0.8,
        "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/HP-UX/HPSBUX0304-253.html"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.ibm.com/jp/"
      },
      {
        "title": "RHSA-2003:120",
        "trust": 0.8,
        "url": "http://rhn.redhat.com/errata/RHSA-2003-120.html"
      },
      {
        "title": "sendmail 8.12.9 available",
        "trust": 0.8,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "title": "52620",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
      },
      {
        "title": "52700",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
      },
      {
        "title": "52700",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-3"
      },
      {
        "title": "52620",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-3"
      },
      {
        "title": "4 Sendmail Security Update 2.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "XTR Sendmail Security Update 1.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "550 Sendmail Security Update 0.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "TLSA-2003-24",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2003/TLSA-2003-24.txt"
      },
      {
        "title": "Sendmail Inc. Information for VU#897604",
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/AAMN-5KUUTZ"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.sendmail.co.jp/"
      },
      {
        "title": "RHSA-2003:120",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-120J.html"
      },
      {
        "title": "TLSA-2003-24",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2003/TLSA-2003-24j.txt"
      },
      {
        "title": "Debian Security Advisories: DSA-290-1 sendmail-wide -- char-to-int conversion",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=8086c3d7d3014252ce37b8626383010c"
      },
      {
        "title": "cumes",
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://www.kb.cert.org/vuls/id/897604"
      },
      {
        "trust": 2.7,
        "url": "http://www.securityfocus.com/bid/7230"
      },
      {
        "trust": 2.6,
        "url": "http://www.cert.org/advisories/ca-2003-12.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/archive/1/321997"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.caldera.com/pub/security/openlinux/cssa-2003-016.0.txt"
      },
      {
        "trust": 1.8,
        "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2003/dsa-278"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2003/dsa-290"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.freebsd.org/pub/freebsd/cert/advisories/freebsd-sa-03:07.sendmail.asc"
      },
      {
        "trust": 1.8,
        "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-march/004295.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-120.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-121.html"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.11/scosa-2004.11.txt"
      },
      {
        "trust": 1.8,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-p"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
      },
      {
        "trust": 1.7,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/archive/1/317135/30/25220/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/archive/1/316773/2003-03-28/2003-04-03/0"
      },
      {
        "trust": 0.8,
        "url": "http://www.iss.net/issen/delivery/xforce/alertdetail.jsp?oid=22127"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org/secure-install.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org/ftp/release_notes"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc2047.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.ciac.org/ciac/bulletins/n-067.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0161"
      },
      {
        "trust": 0.8,
        "url": "http://www.ipa.go.jp/security/ciadr/20030331sendmail.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031401.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031501.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031301.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/at/2003/at030004.txt"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-12"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-07/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0161"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/11653"
      },
      {
        "trust": 0.8,
        "url": "http://www.isskk.co.jp/support/techinfo/general/sendmail033103_xforce.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030330_153031.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030506_122656.html"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104897487512238\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/316961/30/25250/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104914999806315\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f52620"
      },
      {
        "trust": 0.3,
        "url": "http://www.info.apple.com/usen/security/security_updates.html"
      },
      {
        "trust": 0.3,
        "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/mss/mss-oar-e01-2003.0793.1"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://rhn.redhat.com/errata/rhsa-2003-121.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.sendmail.org/"
      },
      {
        "trust": 0.3,
        "url": "http://www.sotlinux.org/en/sotlinux/sa/2003/2003-0019.php"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v4.0f/duv40fb18-c0093400-17811-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1a/t64v51ab21-c0112900-17770-es-20030402.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1b/t64v51bb1-c0008000-17812-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51b20-c0176700-17773-es-20030402.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v4.0g/t64v40gb17-c0029200-17810-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f52700\u0026zone_32=category%3asecurity"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/321997"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/316760"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104897487512238\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104896621106790\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104914999806315\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000614"
      },
      {
        "trust": 0.1,
        "url": ""
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/./dsa-290"
      },
      {
        "trust": 0.1,
        "url": "https://www.exploit-db.com/exploits/24/"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-03-29T00:00:00",
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "date": "2003-04-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "date": "2003-04-02T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "date": "2003-03-29T00:00:00",
        "db": "BID",
        "id": "7230"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "date": "2003-03-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "date": "2003-04-02T05:00:00",
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-25T00:00:00",
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "date": "2007-09-21T23:40:00",
        "db": "BID",
        "id": "7230"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "date": "2010-02-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      },
      {
        "date": "2025-04-03T01:03:51.193000",
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sendmail address parsing buffer overflow",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.9
  }
}

CVE-2004-1332 (GCVE-0-2004-1332)

Vulnerability from cvelistv5 – Published: 2005-01-06 05:00 – Updated: 2024-08-08 00:46
VLAI?
Summary
Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=110797179710695&w=2 vendor-advisoryx_refsource_HP
http://securitytracker.com/id?1012650 vdb-entryx_refsource_SECTRACK
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.securityfocus.com/bid/12077 vdb-entryx_refsource_BID
http://marc.info/?l=bugtraq&m=110797179710695&w=2 vendor-advisoryx_refsource_HP
http://www.kb.cert.org/vuls/id/647438 third-party-advisoryx_refsource_CERT-VN
http://secunia.com/advisories/13608 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.idefense.com/application/poi/display?i… third-party-advisoryx_refsource_IDEFENSE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:46:12.355Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "HPSBUX01118",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
          },
          {
            "name": "1012650",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1012650"
          },
          {
            "name": "oval:org.mitre.oval:def:5701",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701"
          },
          {
            "name": "12077",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12077"
          },
          {
            "name": "SSRT4883",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
          },
          {
            "name": "VU#647438",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/647438"
          },
          {
            "name": "13608",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13608"
          },
          {
            "name": "hp-ftpd-bo(18636)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18636"
          },
          {
            "name": "20041221 Hewlett Packard HP-UX ftpd Remote Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities\u0026flashstatus=false"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-12-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "HPSBUX01118",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
        },
        {
          "name": "1012650",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1012650"
        },
        {
          "name": "oval:org.mitre.oval:def:5701",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701"
        },
        {
          "name": "12077",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12077"
        },
        {
          "name": "SSRT4883",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
        },
        {
          "name": "VU#647438",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/647438"
        },
        {
          "name": "13608",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13608"
        },
        {
          "name": "hp-ftpd-bo(18636)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18636"
        },
        {
          "name": "20041221 Hewlett Packard HP-UX ftpd Remote Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities\u0026flashstatus=false"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1332",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "HPSBUX01118",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
            },
            {
              "name": "1012650",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1012650"
            },
            {
              "name": "oval:org.mitre.oval:def:5701",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701"
            },
            {
              "name": "12077",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12077"
            },
            {
              "name": "SSRT4883",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
            },
            {
              "name": "VU#647438",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/647438"
            },
            {
              "name": "13608",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13608"
            },
            {
              "name": "hp-ftpd-bo(18636)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18636"
            },
            {
              "name": "20041221 Hewlett Packard HP-UX ftpd Remote Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities\u0026flashstatus=false"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1332",
    "datePublished": "2005-01-06T05:00:00",
    "dateReserved": "2005-01-06T00:00:00",
    "dateUpdated": "2024-08-08T00:46:12.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-0161 (GCVE-0-2003-0161)

Vulnerability from cvelistv5 – Published: 2003-04-01 05:00 – Updated: 2024-08-08 01:43
VLAI?
Summary
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.securityfocus.com/bid/7230 vdb-entryx_refsource_BID
http://marc.info/?l=bugtraq&m=104914999806315&w=2 mailing-listx_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2003-120.html vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/archive/1/317135/30/… mailing-listx_refsource_BUGTRAQ
http://www.debian.org/security/2003/dsa-278 vendor-advisoryx_refsource_DEBIAN
http://www.debian.org/security/2003/dsa-290 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/archive/1/317135/30/… vendor-advisoryx_refsource_IMMUNIX
http://lists.apple.com/mhonarc/security-announce/… x_refsource_CONFIRM
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://www.cert.org/advisories/CA-2003-12.html third-party-advisoryx_refsource_CERT
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA… vendor-advisoryx_refsource_CALDERA
http://www.securityfocus.com/archive/1/316961/30/… mailing-listx_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2003-121.html vendor-advisoryx_refsource_REDHAT
http://distro.conectiva.com.br/atualizacoes/?id=a… vendor-advisoryx_refsource_CONECTIVA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-20… vendor-advisoryx_refsource_SCO
http://www.gentoo.org/security/en/glsa/glsa-20030… vendor-advisoryx_refsource_GENTOO
http://lists.grok.org.uk/pipermail/full-disclosur… mailing-listx_refsource_FULLDISC
http://marc.info/?l=bugtraq&m=104897487512238&w=2 mailing-listx_refsource_BUGTRAQ
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories… vendor-advisoryx_refsource_FREEBSD
http://www.securityfocus.com/archive/1/321997 mailing-listx_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=104896621106790&w=2 mailing-listx_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/897604 third-party-advisoryx_refsource_CERT-VN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:43:36.017Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1001088",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
          },
          {
            "name": "52620",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
          },
          {
            "name": "20030401-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P"
          },
          {
            "name": "7230",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7230"
          },
          {
            "name": "20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
          },
          {
            "name": "RHSA-2003:120",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-120.html"
          },
          {
            "name": "20030401 Immunix Secured OS 7+ openssl update",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
          },
          {
            "name": "DSA-278",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-278"
          },
          {
            "name": "DSA-290",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-290"
          },
          {
            "name": "IMNX-2003-7+-002-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_IMMUNIX",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
          },
          {
            "name": "52700",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
          },
          {
            "name": "CA-2003-12",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.cert.org/advisories/CA-2003-12.html"
          },
          {
            "name": "CSSA-2003-016.0",
            "tags": [
              "vendor-advisory",
              "x_refsource_CALDERA",
              "x_transferred"
            ],
            "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt"
          },
          {
            "name": "20030331 GLSA: sendmail (200303-27)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
          },
          {
            "name": "RHSA-2003:121",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-121.html"
          },
          {
            "name": "CLA-2003:614",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
          },
          {
            "name": "SCOSA-2004.11",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt"
          },
          {
            "name": "GLSA-200303-27",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
          },
          {
            "name": "20030329 Sendmail: -1 gone wild",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html"
          },
          {
            "name": "20030329 Sendmail: -1 gone wild",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
          },
          {
            "name": "FreeBSD-SA-03:07",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc"
          },
          {
            "name": "20030520 [Fwd: 127 Research and Development: 127 Day!]",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/321997"
          },
          {
            "name": "20030329 sendmail 8.12.9 available",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
          },
          {
            "name": "VU#897604",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/897604"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-03-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1001088",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
        },
        {
          "name": "52620",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
        },
        {
          "name": "20030401-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P"
        },
        {
          "name": "7230",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7230"
        },
        {
          "name": "20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
        },
        {
          "name": "RHSA-2003:120",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-120.html"
        },
        {
          "name": "20030401 Immunix Secured OS 7+ openssl update",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
        },
        {
          "name": "DSA-278",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-278"
        },
        {
          "name": "DSA-290",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-290"
        },
        {
          "name": "IMNX-2003-7+-002-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_IMMUNIX"
          ],
          "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
        },
        {
          "name": "52700",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
        },
        {
          "name": "CA-2003-12",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.cert.org/advisories/CA-2003-12.html"
        },
        {
          "name": "CSSA-2003-016.0",
          "tags": [
            "vendor-advisory",
            "x_refsource_CALDERA"
          ],
          "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt"
        },
        {
          "name": "20030331 GLSA: sendmail (200303-27)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
        },
        {
          "name": "RHSA-2003:121",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-121.html"
        },
        {
          "name": "CLA-2003:614",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
        },
        {
          "name": "SCOSA-2004.11",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt"
        },
        {
          "name": "GLSA-200303-27",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
        },
        {
          "name": "20030329 Sendmail: -1 gone wild",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html"
        },
        {
          "name": "20030329 Sendmail: -1 gone wild",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
        },
        {
          "name": "FreeBSD-SA-03:07",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc"
        },
        {
          "name": "20030520 [Fwd: 127 Research and Development: 127 Day!]",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/321997"
        },
        {
          "name": "20030329 sendmail 8.12.9 available",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
        },
        {
          "name": "VU#897604",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/897604"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0161",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1001088",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
            },
            {
              "name": "52620",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
            },
            {
              "name": "20030401-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P"
            },
            {
              "name": "7230",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7230"
            },
            {
              "name": "20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
            },
            {
              "name": "RHSA-2003:120",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-120.html"
            },
            {
              "name": "20030401 Immunix Secured OS 7+ openssl update",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
            },
            {
              "name": "DSA-278",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-278"
            },
            {
              "name": "DSA-290",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-290"
            },
            {
              "name": "IMNX-2003-7+-002-01",
              "refsource": "IMMUNIX",
              "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
            },
            {
              "name": "http://lists.apple.com/mhonarc/security-announce/msg00028.html",
              "refsource": "CONFIRM",
              "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
            },
            {
              "name": "52700",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
            },
            {
              "name": "CA-2003-12",
              "refsource": "CERT",
              "url": "http://www.cert.org/advisories/CA-2003-12.html"
            },
            {
              "name": "CSSA-2003-016.0",
              "refsource": "CALDERA",
              "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt"
            },
            {
              "name": "20030331 GLSA: sendmail (200303-27)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
            },
            {
              "name": "RHSA-2003:121",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-121.html"
            },
            {
              "name": "CLA-2003:614",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
            },
            {
              "name": "SCOSA-2004.11",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt"
            },
            {
              "name": "GLSA-200303-27",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
            },
            {
              "name": "20030329 Sendmail: -1 gone wild",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html"
            },
            {
              "name": "20030329 Sendmail: -1 gone wild",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
            },
            {
              "name": "FreeBSD-SA-03:07",
              "refsource": "FREEBSD",
              "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc"
            },
            {
              "name": "20030520 [Fwd: 127 Research and Development: 127 Day!]",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/321997"
            },
            {
              "name": "20030329 sendmail 8.12.9 available",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
            },
            {
              "name": "VU#897604",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/897604"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0161",
    "datePublished": "2003-04-01T05:00:00",
    "dateReserved": "2003-03-24T00:00:00",
    "dateUpdated": "2024-08-08T01:43:36.017Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-1332 (GCVE-0-2004-1332)

Vulnerability from nvd – Published: 2005-01-06 05:00 – Updated: 2024-08-08 00:46
VLAI?
Summary
Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://marc.info/?l=bugtraq&m=110797179710695&w=2 vendor-advisoryx_refsource_HP
http://securitytracker.com/id?1012650 vdb-entryx_refsource_SECTRACK
https://oval.cisecurity.org/repository/search/def… vdb-entrysignaturex_refsource_OVAL
http://www.securityfocus.com/bid/12077 vdb-entryx_refsource_BID
http://marc.info/?l=bugtraq&m=110797179710695&w=2 vendor-advisoryx_refsource_HP
http://www.kb.cert.org/vuls/id/647438 third-party-advisoryx_refsource_CERT-VN
http://secunia.com/advisories/13608 third-party-advisoryx_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilit… vdb-entryx_refsource_XF
http://www.idefense.com/application/poi/display?i… third-party-advisoryx_refsource_IDEFENSE
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:46:12.355Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "HPSBUX01118",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
          },
          {
            "name": "1012650",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1012650"
          },
          {
            "name": "oval:org.mitre.oval:def:5701",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701"
          },
          {
            "name": "12077",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12077"
          },
          {
            "name": "SSRT4883",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
          },
          {
            "name": "VU#647438",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/647438"
          },
          {
            "name": "13608",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13608"
          },
          {
            "name": "hp-ftpd-bo(18636)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18636"
          },
          {
            "name": "20041221 Hewlett Packard HP-UX ftpd Remote Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities\u0026flashstatus=false"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-12-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "HPSBUX01118",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
        },
        {
          "name": "1012650",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1012650"
        },
        {
          "name": "oval:org.mitre.oval:def:5701",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701"
        },
        {
          "name": "12077",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12077"
        },
        {
          "name": "SSRT4883",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
        },
        {
          "name": "VU#647438",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/647438"
        },
        {
          "name": "13608",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13608"
        },
        {
          "name": "hp-ftpd-bo(18636)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18636"
        },
        {
          "name": "20041221 Hewlett Packard HP-UX ftpd Remote Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities\u0026flashstatus=false"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1332",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "HPSBUX01118",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
            },
            {
              "name": "1012650",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1012650"
            },
            {
              "name": "oval:org.mitre.oval:def:5701",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701"
            },
            {
              "name": "12077",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12077"
            },
            {
              "name": "SSRT4883",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
            },
            {
              "name": "VU#647438",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/647438"
            },
            {
              "name": "13608",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13608"
            },
            {
              "name": "hp-ftpd-bo(18636)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18636"
            },
            {
              "name": "20041221 Hewlett Packard HP-UX ftpd Remote Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities\u0026flashstatus=false"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1332",
    "datePublished": "2005-01-06T05:00:00",
    "dateReserved": "2005-01-06T00:00:00",
    "dateUpdated": "2024-08-08T00:46:12.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-0161 (GCVE-0-2003-0161)

Vulnerability from nvd – Published: 2003-04-01 05:00 – Updated: 2024-08-08 01:43
VLAI?
Summary
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
Severity ?
No CVSS data available.
CWE
  • n/a
Assigner
References
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
ftp://patches.sgi.com/support/free/security/advis… vendor-advisoryx_refsource_SGI
http://www.securityfocus.com/bid/7230 vdb-entryx_refsource_BID
http://marc.info/?l=bugtraq&m=104914999806315&w=2 mailing-listx_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2003-120.html vendor-advisoryx_refsource_REDHAT
http://www.securityfocus.com/archive/1/317135/30/… mailing-listx_refsource_BUGTRAQ
http://www.debian.org/security/2003/dsa-278 vendor-advisoryx_refsource_DEBIAN
http://www.debian.org/security/2003/dsa-290 vendor-advisoryx_refsource_DEBIAN
http://www.securityfocus.com/archive/1/317135/30/… vendor-advisoryx_refsource_IMMUNIX
http://lists.apple.com/mhonarc/security-announce/… x_refsource_CONFIRM
http://sunsolve.sun.com/search/document.do?assetk… vendor-advisoryx_refsource_SUNALERT
http://www.cert.org/advisories/CA-2003-12.html third-party-advisoryx_refsource_CERT
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA… vendor-advisoryx_refsource_CALDERA
http://www.securityfocus.com/archive/1/316961/30/… mailing-listx_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2003-121.html vendor-advisoryx_refsource_REDHAT
http://distro.conectiva.com.br/atualizacoes/?id=a… vendor-advisoryx_refsource_CONECTIVA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-20… vendor-advisoryx_refsource_SCO
http://www.gentoo.org/security/en/glsa/glsa-20030… vendor-advisoryx_refsource_GENTOO
http://lists.grok.org.uk/pipermail/full-disclosur… mailing-listx_refsource_FULLDISC
http://marc.info/?l=bugtraq&m=104897487512238&w=2 mailing-listx_refsource_BUGTRAQ
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories… vendor-advisoryx_refsource_FREEBSD
http://www.securityfocus.com/archive/1/321997 mailing-listx_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=104896621106790&w=2 mailing-listx_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/897604 third-party-advisoryx_refsource_CERT-VN
Show details on NVD website

{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:43:36.017Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1001088",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
          },
          {
            "name": "52620",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
          },
          {
            "name": "20030401-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P"
          },
          {
            "name": "7230",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7230"
          },
          {
            "name": "20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
          },
          {
            "name": "RHSA-2003:120",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-120.html"
          },
          {
            "name": "20030401 Immunix Secured OS 7+ openssl update",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
          },
          {
            "name": "DSA-278",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-278"
          },
          {
            "name": "DSA-290",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-290"
          },
          {
            "name": "IMNX-2003-7+-002-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_IMMUNIX",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
          },
          {
            "name": "52700",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
          },
          {
            "name": "CA-2003-12",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.cert.org/advisories/CA-2003-12.html"
          },
          {
            "name": "CSSA-2003-016.0",
            "tags": [
              "vendor-advisory",
              "x_refsource_CALDERA",
              "x_transferred"
            ],
            "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt"
          },
          {
            "name": "20030331 GLSA: sendmail (200303-27)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
          },
          {
            "name": "RHSA-2003:121",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-121.html"
          },
          {
            "name": "CLA-2003:614",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
          },
          {
            "name": "SCOSA-2004.11",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt"
          },
          {
            "name": "GLSA-200303-27",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
          },
          {
            "name": "20030329 Sendmail: -1 gone wild",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html"
          },
          {
            "name": "20030329 Sendmail: -1 gone wild",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
          },
          {
            "name": "FreeBSD-SA-03:07",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc"
          },
          {
            "name": "20030520 [Fwd: 127 Research and Development: 127 Day!]",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/321997"
          },
          {
            "name": "20030329 sendmail 8.12.9 available",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
          },
          {
            "name": "VU#897604",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/897604"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-03-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1001088",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
        },
        {
          "name": "52620",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
        },
        {
          "name": "20030401-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P"
        },
        {
          "name": "7230",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7230"
        },
        {
          "name": "20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
        },
        {
          "name": "RHSA-2003:120",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-120.html"
        },
        {
          "name": "20030401 Immunix Secured OS 7+ openssl update",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
        },
        {
          "name": "DSA-278",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-278"
        },
        {
          "name": "DSA-290",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-290"
        },
        {
          "name": "IMNX-2003-7+-002-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_IMMUNIX"
          ],
          "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
        },
        {
          "name": "52700",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
        },
        {
          "name": "CA-2003-12",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.cert.org/advisories/CA-2003-12.html"
        },
        {
          "name": "CSSA-2003-016.0",
          "tags": [
            "vendor-advisory",
            "x_refsource_CALDERA"
          ],
          "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt"
        },
        {
          "name": "20030331 GLSA: sendmail (200303-27)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
        },
        {
          "name": "RHSA-2003:121",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-121.html"
        },
        {
          "name": "CLA-2003:614",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
        },
        {
          "name": "SCOSA-2004.11",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt"
        },
        {
          "name": "GLSA-200303-27",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
        },
        {
          "name": "20030329 Sendmail: -1 gone wild",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html"
        },
        {
          "name": "20030329 Sendmail: -1 gone wild",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
        },
        {
          "name": "FreeBSD-SA-03:07",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc"
        },
        {
          "name": "20030520 [Fwd: 127 Research and Development: 127 Day!]",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/321997"
        },
        {
          "name": "20030329 sendmail 8.12.9 available",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
        },
        {
          "name": "VU#897604",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/897604"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0161",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1001088",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
            },
            {
              "name": "52620",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
            },
            {
              "name": "20030401-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P"
            },
            {
              "name": "7230",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7230"
            },
            {
              "name": "20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
            },
            {
              "name": "RHSA-2003:120",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-120.html"
            },
            {
              "name": "20030401 Immunix Secured OS 7+ openssl update",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
            },
            {
              "name": "DSA-278",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-278"
            },
            {
              "name": "DSA-290",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-290"
            },
            {
              "name": "IMNX-2003-7+-002-01",
              "refsource": "IMMUNIX",
              "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
            },
            {
              "name": "http://lists.apple.com/mhonarc/security-announce/msg00028.html",
              "refsource": "CONFIRM",
              "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
            },
            {
              "name": "52700",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
            },
            {
              "name": "CA-2003-12",
              "refsource": "CERT",
              "url": "http://www.cert.org/advisories/CA-2003-12.html"
            },
            {
              "name": "CSSA-2003-016.0",
              "refsource": "CALDERA",
              "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt"
            },
            {
              "name": "20030331 GLSA: sendmail (200303-27)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
            },
            {
              "name": "RHSA-2003:121",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-121.html"
            },
            {
              "name": "CLA-2003:614",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
            },
            {
              "name": "SCOSA-2004.11",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt"
            },
            {
              "name": "GLSA-200303-27",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
            },
            {
              "name": "20030329 Sendmail: -1 gone wild",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html"
            },
            {
              "name": "20030329 Sendmail: -1 gone wild",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
            },
            {
              "name": "FreeBSD-SA-03:07",
              "refsource": "FREEBSD",
              "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc"
            },
            {
              "name": "20030520 [Fwd: 127 Research and Development: 127 Day!]",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/321997"
            },
            {
              "name": "20030329 sendmail 8.12.9 available",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
            },
            {
              "name": "VU#897604",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/897604"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0161",
    "datePublished": "2003-04-01T05:00:00",
    "dateReserved": "2003-03-24T00:00:00",
    "dateUpdated": "2024-08-08T01:43:36.017Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}