CVE-2003-0681
Vulnerability from cvelistv5
Published
2003-09-18 04:00
Modified
2024-08-08 02:05
Severity ?
Summary
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
References
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742
cve@mitre.orghttp://marc.info/?l=bugtraq&m=106383437615742&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=106398718909274&w=2
cve@mitre.orghttp://www.debian.org/security/2003/dsa-384
cve@mitre.orghttp://www.kb.cert.org/vuls/id/108964US Government Resource
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2003:092
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-283.html
cve@mitre.orghttp://www.securityfocus.com/bid/8649Vendor Advisory
cve@mitre.orghttp://www.sendmail.org/8.12.10.htmlPatch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/13216
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=106383437615742&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=106398718909274&w=2
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2003/dsa-384
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/108964US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2003:092
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-283.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/8649Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.sendmail.org/8.12.10.htmlPatch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/13216
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T02:05:11.990Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "20030919 [OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.sendmail.org/8.12.10.html"
          },
          {
            "name": "RHSA-2003:283",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-283.html"
          },
          {
            "name": "oval:org.mitre.oval:def:595",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595"
          },
          {
            "name": "MDKSA-2003:092",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRAKE",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:092"
          },
          {
            "name": "oval:org.mitre.oval:def:3606",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606"
          },
          {
            "name": "VU#108964",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/108964"
          },
          {
            "name": "DSA-384",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-384"
          },
          {
            "name": "sendmail-ruleset-parsing-bo(13216)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13216"
          },
          {
            "name": "20030917 GLSA:  sendmail (200309-13)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2"
          },
          {
            "name": "8649",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/8649"
          },
          {
            "name": "CLA-2003:742",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-09-17T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "A \"potential buffer overflow in ruleset parsing\" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "20030919 [OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.sendmail.org/8.12.10.html"
        },
        {
          "name": "RHSA-2003:283",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-283.html"
        },
        {
          "name": "oval:org.mitre.oval:def:595",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595"
        },
        {
          "name": "MDKSA-2003:092",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRAKE"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:092"
        },
        {
          "name": "oval:org.mitre.oval:def:3606",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606"
        },
        {
          "name": "VU#108964",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/108964"
        },
        {
          "name": "DSA-384",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-384"
        },
        {
          "name": "sendmail-ruleset-parsing-bo(13216)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13216"
        },
        {
          "name": "20030917 GLSA:  sendmail (200309-13)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2"
        },
        {
          "name": "8649",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/8649"
        },
        {
          "name": "CLA-2003:742",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0681",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "A \"potential buffer overflow in ruleset parsing\" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "20030919 [OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2"
            },
            {
              "name": "http://www.sendmail.org/8.12.10.html",
              "refsource": "CONFIRM",
              "url": "http://www.sendmail.org/8.12.10.html"
            },
            {
              "name": "RHSA-2003:283",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-283.html"
            },
            {
              "name": "oval:org.mitre.oval:def:595",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595"
            },
            {
              "name": "MDKSA-2003:092",
              "refsource": "MANDRAKE",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:092"
            },
            {
              "name": "oval:org.mitre.oval:def:3606",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606"
            },
            {
              "name": "VU#108964",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/108964"
            },
            {
              "name": "DSA-384",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-384"
            },
            {
              "name": "sendmail-ruleset-parsing-bo(13216)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/13216"
            },
            {
              "name": "20030917 GLSA:  sendmail (200309-13)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2"
            },
            {
              "name": "8649",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/8649"
            },
            {
              "name": "CLA-2003:742",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0681",
    "datePublished": "2003-09-18T04:00:00",
    "dateReserved": "2003-08-13T00:00:00",
    "dateUpdated": "2024-08-08T02:05:11.990Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2003-0681\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-10-06T04:00:00.000\",\"lastModified\":\"2024-11-20T23:45:17.430\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"A \\\"potential buffer overflow in ruleset parsing\\\" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.\"},{\"lang\":\"es\",\"value\":\"Un \\\"desbordamiento de b\u00fafer potencial en el an\u00e1lisis de reglas\\\" (ruleset parsing) en Sendmail 8.12.9 cuando se usan los conjuntos de reglas no est\u00e1ndar: (1) receptor, (2) final, o (3) receptores de envoltorio espec\u00edficos del enviador de correo, tienen consecuencias desconocidas.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:P/I:P/A:P\",\"baseScore\":7.5,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":true,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FABD33DF-FEC4-4519-B2ED-4E498A7329FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2455BE6E-7540-4545-B40A-0366BDA6AE7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CA16C02-3B8D-4188-898E-048A93F11ADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF12CC4-C9CD-479A-8F85-8F947B5B60A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623A2E07-2122-4ADE-9932-011DCA4396A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C563EF-FDED-4193-A66A-06527878BB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A267D3-2F49-4E61-B2C9-D8ED2265665E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7199205A-B914-40A1-9C82-A9698511E3C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEC468AB-8B18-4169-8040-614A32444732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D30A1136-074A-460D-9794-DDD530626800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76A9602B-8E5A-4BF4-81F5-D1152D09FCAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD0B100-D822-4EBF-8EC9-ADAB8141116B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"196D77DF-E6D4-46D0-BC2C-8804A587CA25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B743E5A3-6B15-4877-9424-A1F1A4214B73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76A60742-7815-4658-A6F7-147AA48C24B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A1A24F2-9C6B-4DF0-AB04-55D051812DD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"120271B8-08A9-4C21-A108-0DA61095A006\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E6ECDA-DF65-47FF-A42F-FD5C1D864FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AA859AF-4E4E-4077-8E98-523E617A1DDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9791650-C367-43B6-A0F4-5BB56CE10778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8340DDA8-77DD-4AEB-B267-F86F64A851B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07DCBBEE-1DF0-40FE-B755-1FC35CF16788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581626E7-47B5-4819-B34F-B6DFD07A12F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BBE9A4A-8AB9-4A97-A106-970FEB08952C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD99394C-5408-4A01-8D4E-417FFFFDE9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAB59A24-87DE-4CAD-A2BA-AFCC0B2A55B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D641EF-0B69-45A1-B85E-3C9C93AB9D42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8972211B-6A5B-4095-9CBB-CEF4C23C9C65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F81A2AD-90A0-4B97-86A3-92690A0FCA71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F74BA-2B71-435E-92B8-9DEADB3311A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A46DF2-8EEB-40C8-B1CA-01BC064BD25E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581E5904-1A2B-49FF-BE3F-D42019AD816B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6CC4C83-4FB9-4344-AFCB-C260659F81DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAF763B4-58E3-4868-8C92-47DE3E4E5F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FEB3923-8F4B-4523-84F9-17D1CFA37F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58CD19B4-4BFD-4DE8-B21F-6B6CDE6793C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B82BBB7-CD72-4A33-97D4-B1E51A595323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1D6A40-5DD1-481C-AF85-85705FCE3680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_pro:8.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9371E42-3A43-4E60-9C03-841B5901AF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_pro:8.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E172E270-E0EE-49C6-AEF7-B533CD88F67D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5492A89B-8140-4CF7-BE81-09C25A64373A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A6D5AF-2134-4EC5-B53A-CE95B5505325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B5FE819-E570-4AEE-BF0C-B9B1960A1AB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"913AF73A-F6DE-4FAF-8A09-02CD33784B27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"661A9B85-09EE-4D38-9160-8EEA6BE07BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28941D4-7D1E-4BF9-8E2F-C951978424E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD930C49-512B-4114-8A97-80B1816CFCFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E8553E3-578B-4BE3-BBAD-5589338586E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7EE5C8E-8E2E-4C98-B8C5-B590E44B1EAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A3930ED-DE49-4F01-A904-5D66E34832F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A51855-94DD-4F2E-BFF8-4ABE4613F962\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B76FFE-90CB-4C11-9E9D-FFA896482628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74C77927-A67A-4C1B-BB80-18148E1F0FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9D22E3-18F8-42F9-993E-81E832B0B125\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BABB5CA-26F4-4DB6-9D43-1C82751DCCA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F323395B-4549-4B54-8BBF-66B1B1B3F563\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDCF4FB3-F781-46D5-BEE7-485B3DC78B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE52A344-8B07-480D-A57F-B1F6E6574F3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CC0444-570C-4BB5-B53A-C5CA0BD87935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62E3EED7-FE30-4620-B40B-9CC49B77408A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFD8BC6-4893-4D9D-A26E-27AAC864F94B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD1F9A1-5ADB-451D-9525-D545E42D2B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A24978-2891-425C-ACF6-E8F5C839C54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00AE033B-5F16-4262-A397-02D7450189B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E831F3E-A980-47AF-BD05-2DB1A14689B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36991737-904F-4B26-AEE2-7B30411279E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7EE6036-1A18-43F1-8A92-7DF39E1516E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"620ECFC8-293D-4C2B-9698-67185BB6E2EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F14A45-BDDB-4C12-9370-D5241975A928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46BC34D4-A1E8-4E01-982D-EAF03A0EB886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"980553F2-8662-47CF-95F0-645141746AEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40EBF1CD-B392-4262-8F06-2C784ADAF0F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C00F84A-FCD4-4935-B7DE-ECBA6AE9B074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"960DC6C2-B285-41D4-96F7-ED97F8BD5482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1FD0EB4-E744-4465-AFEE-A3C807C9C993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"57772E3B-893C-408A-AA3B-78C972ED4D5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"771931F7-9180-4EBD-8627-E1CF17D24647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB008E3-9A00-4D28-8826-A9FCC9F65314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD9BE2B-7255-4FC1-B452-E8370632B03F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465B06C4-136D-4CD8-BA38-B6B50511624C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB23261-D5A9-4C49-B08E-97A63ED6F84A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17EECCCB-D7D1-439A-9985-8FAE8B44487B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F89124-E194-4C7A-B06D-8535B4066AA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10D9BF9-FCC7-4680-AD3A-95757FC005EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*\",\"matchCriteriaId\":\"52F2B17F-A169-402C-AA05-0DE5D805BAD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"BD44E15F-D216-404F-8585-D278175C2A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E8C3A4-9FA7-4F2A-8C65-D4404715E674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC78BA4-70F4-4B9F-93C2-B107E4DCC418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A10F5A-067E-4DD8-B585-ABCD6F6B324E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DDC444D-E763-4685-97F8-A027DF6F804D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"249FA642-3732-4654-88CB-3F1D19A5860A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1957B3C0-7F25-469B-BC3F-7B09260837ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AC46909F-DDFC-448B-BCDF-1EB343F96630\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_advanced_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E4BDC1-7750-4B35-88E1-F8449D255114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D8C8D6-8EC1-4B64-996C-636ECD78E7B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC0256B-3962-433A-9FAC-37FFAE43E888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"839D2945-1417-43F5-A526-A14C491CBCEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06DCF0D-3241-453A-A0E4-937FE25EC404\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4844D5C-3859-47B1-9A71-CEA2053E2213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9428589A-0BD2-469E-978D-38239117D972\"}]}]}],\"references\":[{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2003/dsa-384\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/108964\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:092\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-283.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/8649\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.sendmail.org/8.12.10.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/13216\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2003/dsa-384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/108964\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-283.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/8649\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.sendmail.org/8.12.10.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/13216\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.