CVE-2003-0681
Vulnerability from cvelistv5
Published
2003-09-18 04:00
Modified
2024-08-08 02:05
Severity ?
EPSS score ?
Summary
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:05:11.990Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20030919 [OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sendmail.org/8.12.10.html" }, { "name": "RHSA-2003:283", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-283.html" }, { "name": "oval:org.mitre.oval:def:595", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595" }, { "name": "MDKSA-2003:092", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:092" }, { "name": "oval:org.mitre.oval:def:3606", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606" }, { "name": "VU#108964", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/108964" }, { "name": "DSA-384", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-384" }, { "name": "sendmail-ruleset-parsing-bo(13216)", "tags": [ "vdb-entry", "x_refsource_XF", "x_transferred" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13216" }, { "name": "20030917 GLSA: sendmail (200309-13)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2" }, { "name": "8649", "tags": [ "vdb-entry", "x_refsource_BID", "x_transferred" ], "url": "http://www.securityfocus.com/bid/8649" }, { "name": "CLA-2003:742", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-09-17T00:00:00", "descriptions": [ { "lang": "en", "value": "A \"potential buffer overflow in ruleset parsing\" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20030919 [OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sendmail.org/8.12.10.html" }, { "name": "RHSA-2003:283", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-283.html" }, { "name": "oval:org.mitre.oval:def:595", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595" }, { "name": "MDKSA-2003:092", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:092" }, { "name": "oval:org.mitre.oval:def:3606", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606" }, { "name": "VU#108964", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/108964" }, { "name": "DSA-384", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-384" }, { "name": "sendmail-ruleset-parsing-bo(13216)", "tags": [ "vdb-entry", "x_refsource_XF" ], "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13216" }, { "name": "20030917 GLSA: sendmail (200309-13)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2" }, { "name": "8649", "tags": [ "vdb-entry", "x_refsource_BID" ], "url": "http://www.securityfocus.com/bid/8649" }, { "name": "CLA-2003:742", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0681", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "A \"potential buffer overflow in ruleset parsing\" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20030919 [OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2" }, { "name": "http://www.sendmail.org/8.12.10.html", "refsource": "CONFIRM", "url": "http://www.sendmail.org/8.12.10.html" }, { "name": "RHSA-2003:283", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-283.html" }, { "name": "oval:org.mitre.oval:def:595", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595" }, { "name": "MDKSA-2003:092", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:092" }, { "name": "oval:org.mitre.oval:def:3606", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606" }, { "name": "VU#108964", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/108964" }, { "name": "DSA-384", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-384" }, { "name": "sendmail-ruleset-parsing-bo(13216)", "refsource": "XF", "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13216" }, { "name": "20030917 GLSA: sendmail (200309-13)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2" }, { "name": "8649", "refsource": "BID", "url": "http://www.securityfocus.com/bid/8649" }, { "name": "CLA-2003:742", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0681", "datePublished": "2003-09-18T04:00:00", "dateReserved": "2003-08-13T00:00:00", "dateUpdated": "2024-08-08T02:05:11.990Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2003-0681\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-10-06T04:00:00.000\",\"lastModified\":\"2024-11-20T23:45:17.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A \\\"potential buffer overflow in ruleset parsing\\\" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.\"},{\"lang\":\"es\",\"value\":\"Un \\\"desbordamiento de b\u00fafer potencial en el an\u00e1lisis de reglas\\\" (ruleset parsing) en Sendmail 8.12.9 cuando se usan los conjuntos de reglas no est\u00e1ndar: (1) receptor, (2) final, o (3) receptores de envoltorio espec\u00edficos del enviador de correo, tienen consecuencias desconocidas.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FABD33DF-FEC4-4519-B2ED-4E498A7329FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2455BE6E-7540-4545-B40A-0366BDA6AE7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CA16C02-3B8D-4188-898E-048A93F11ADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF12CC4-C9CD-479A-8F85-8F947B5B60A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623A2E07-2122-4ADE-9932-011DCA4396A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C563EF-FDED-4193-A66A-06527878BB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A267D3-2F49-4E61-B2C9-D8ED2265665E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7199205A-B914-40A1-9C82-A9698511E3C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEC468AB-8B18-4169-8040-614A32444732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D30A1136-074A-460D-9794-DDD530626800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76A9602B-8E5A-4BF4-81F5-D1152D09FCAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD0B100-D822-4EBF-8EC9-ADAB8141116B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"196D77DF-E6D4-46D0-BC2C-8804A587CA25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B743E5A3-6B15-4877-9424-A1F1A4214B73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76A60742-7815-4658-A6F7-147AA48C24B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A1A24F2-9C6B-4DF0-AB04-55D051812DD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"120271B8-08A9-4C21-A108-0DA61095A006\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E6ECDA-DF65-47FF-A42F-FD5C1D864FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AA859AF-4E4E-4077-8E98-523E617A1DDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9791650-C367-43B6-A0F4-5BB56CE10778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8340DDA8-77DD-4AEB-B267-F86F64A851B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07DCBBEE-1DF0-40FE-B755-1FC35CF16788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581626E7-47B5-4819-B34F-B6DFD07A12F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BBE9A4A-8AB9-4A97-A106-970FEB08952C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD99394C-5408-4A01-8D4E-417FFFFDE9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAB59A24-87DE-4CAD-A2BA-AFCC0B2A55B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D641EF-0B69-45A1-B85E-3C9C93AB9D42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8972211B-6A5B-4095-9CBB-CEF4C23C9C65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F81A2AD-90A0-4B97-86A3-92690A0FCA71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F74BA-2B71-435E-92B8-9DEADB3311A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A46DF2-8EEB-40C8-B1CA-01BC064BD25E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581E5904-1A2B-49FF-BE3F-D42019AD816B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6CC4C83-4FB9-4344-AFCB-C260659F81DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAF763B4-58E3-4868-8C92-47DE3E4E5F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FEB3923-8F4B-4523-84F9-17D1CFA37F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58CD19B4-4BFD-4DE8-B21F-6B6CDE6793C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B82BBB7-CD72-4A33-97D4-B1E51A595323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1D6A40-5DD1-481C-AF85-85705FCE3680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_pro:8.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9371E42-3A43-4E60-9C03-841B5901AF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_pro:8.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E172E270-E0EE-49C6-AEF7-B533CD88F67D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5492A89B-8140-4CF7-BE81-09C25A64373A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A6D5AF-2134-4EC5-B53A-CE95B5505325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B5FE819-E570-4AEE-BF0C-B9B1960A1AB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"913AF73A-F6DE-4FAF-8A09-02CD33784B27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"661A9B85-09EE-4D38-9160-8EEA6BE07BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28941D4-7D1E-4BF9-8E2F-C951978424E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD930C49-512B-4114-8A97-80B1816CFCFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E8553E3-578B-4BE3-BBAD-5589338586E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7EE5C8E-8E2E-4C98-B8C5-B590E44B1EAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A3930ED-DE49-4F01-A904-5D66E34832F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A51855-94DD-4F2E-BFF8-4ABE4613F962\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B76FFE-90CB-4C11-9E9D-FFA896482628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74C77927-A67A-4C1B-BB80-18148E1F0FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9D22E3-18F8-42F9-993E-81E832B0B125\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BABB5CA-26F4-4DB6-9D43-1C82751DCCA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F323395B-4549-4B54-8BBF-66B1B1B3F563\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDCF4FB3-F781-46D5-BEE7-485B3DC78B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE52A344-8B07-480D-A57F-B1F6E6574F3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CC0444-570C-4BB5-B53A-C5CA0BD87935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62E3EED7-FE30-4620-B40B-9CC49B77408A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFD8BC6-4893-4D9D-A26E-27AAC864F94B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD1F9A1-5ADB-451D-9525-D545E42D2B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A24978-2891-425C-ACF6-E8F5C839C54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00AE033B-5F16-4262-A397-02D7450189B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E831F3E-A980-47AF-BD05-2DB1A14689B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36991737-904F-4B26-AEE2-7B30411279E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7EE6036-1A18-43F1-8A92-7DF39E1516E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"620ECFC8-293D-4C2B-9698-67185BB6E2EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F14A45-BDDB-4C12-9370-D5241975A928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46BC34D4-A1E8-4E01-982D-EAF03A0EB886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"980553F2-8662-47CF-95F0-645141746AEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40EBF1CD-B392-4262-8F06-2C784ADAF0F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C00F84A-FCD4-4935-B7DE-ECBA6AE9B074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"960DC6C2-B285-41D4-96F7-ED97F8BD5482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1FD0EB4-E744-4465-AFEE-A3C807C9C993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"57772E3B-893C-408A-AA3B-78C972ED4D5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"771931F7-9180-4EBD-8627-E1CF17D24647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB008E3-9A00-4D28-8826-A9FCC9F65314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD9BE2B-7255-4FC1-B452-E8370632B03F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465B06C4-136D-4CD8-BA38-B6B50511624C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB23261-D5A9-4C49-B08E-97A63ED6F84A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17EECCCB-D7D1-439A-9985-8FAE8B44487B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F89124-E194-4C7A-B06D-8535B4066AA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10D9BF9-FCC7-4680-AD3A-95757FC005EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*\",\"matchCriteriaId\":\"52F2B17F-A169-402C-AA05-0DE5D805BAD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"BD44E15F-D216-404F-8585-D278175C2A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E8C3A4-9FA7-4F2A-8C65-D4404715E674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC78BA4-70F4-4B9F-93C2-B107E4DCC418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A10F5A-067E-4DD8-B585-ABCD6F6B324E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DDC444D-E763-4685-97F8-A027DF6F804D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"249FA642-3732-4654-88CB-3F1D19A5860A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1957B3C0-7F25-469B-BC3F-7B09260837ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC46909F-DDFC-448B-BCDF-1EB343F96630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_advanced_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E4BDC1-7750-4B35-88E1-F8449D255114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D8C8D6-8EC1-4B64-996C-636ECD78E7B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC0256B-3962-433A-9FAC-37FFAE43E888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"839D2945-1417-43F5-A526-A14C491CBCEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06DCF0D-3241-453A-A0E4-937FE25EC404\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4844D5C-3859-47B1-9A71-CEA2053E2213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9428589A-0BD2-469E-978D-38239117D972\"}]}]}],\"references\":[{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-384\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/108964\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:092\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-283.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/8649\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.sendmail.org/8.12.10.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/13216\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/108964\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-283.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/8649\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.sendmail.org/8.12.10.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/13216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.