All the vulnerabilites related to RIMARTS - Becky! Internet Mail
jvndb-2006-000617
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2008-05-21 00:00
Severity ?
() - -
Summary
Multiple email clients vulnerable to directory traversal due to inappropriate unicode handling
Details
Some email clients contain a vulnerability when handling an attached file with a file name using unicode. This may result in a directory traversal attack or displaying a file name diffrently from the actual file name.
References
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2006/JVNDB-2006-000617.html",
  "dc:date": "2008-05-21T00:00+09:00",
  "dcterms:issued": "2008-05-21T00:00+09:00",
  "dcterms:modified": "2008-05-21T00:00+09:00",
  "description": "Some email clients contain a vulnerability when handling an attached file with a file name using unicode. This may result in a directory traversal attack or displaying a file name diffrently from the actual file name.",
  "link": "https://jvndb.jvn.jp/en/contents/2006/JVNDB-2006-000617.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:misc:paseri",
      "@product": "Paseri",
      "@vendor": "NIPPON CONTROL SYSTEM Corporation.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:ricoh:ridoc_document_router",
      "@product": "Ridoc Document Router",
      "@vendor": "Ricoh Co., Ltd",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:rimarts_inc.:becky_internet_mail",
      "@product": "Becky! Internet Mail",
      "@vendor": "RIMARTS",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:P/I:N/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2006-000617",
  "sec:references": {
    "#text": "http://jvn.jp/en/jp/JVN84775942/index.html",
    "@id": "JVN#84775942",
    "@source": "JVN"
  },
  "title": "Multiple email clients vulnerable to directory traversal due to inappropriate unicode handling"
}

jvndb-2009-000011
Vulnerability from jvndb
Published
2009-02-12 17:28
Modified
2009-02-12 17:28
Severity ?
() - -
Summary
Becky! Internet Mail buffer overflow vulnerability
Details
Becky! Internet Mail contains a buffer overflow vulnerability. Becky! Internet Mail is an email client software. Becky! Internet Mail contains a buffer overflow vulnerability as it does not properly handle read receipt requests. Yuji Ukai of Fourteenforty Research Institute, Inc. reported this vulnerability to IPA. JPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.
Impacted products
RIMARTSBecky! Internet Mail
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000011.html",
  "dc:date": "2009-02-12T17:28+09:00",
  "dcterms:issued": "2009-02-12T17:28+09:00",
  "dcterms:modified": "2009-02-12T17:28+09:00",
  "description": "Becky! Internet Mail contains a buffer overflow vulnerability. \r\n\r\nBecky! Internet Mail is an email client software. Becky! Internet Mail contains a buffer overflow vulnerability as it does not properly handle read receipt requests.\r\n\r\nYuji Ukai of Fourteenforty Research Institute, Inc. reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the vendor under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-000011.html",
  "sec:cpe": {
    "#text": "cpe:/a:rimarts_inc.:becky_internet_mail",
    "@product": "Becky! Internet Mail",
    "@vendor": "RIMARTS",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "6.8",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2009-000011",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN29641290/index.html",
      "@id": "JVN#29641290",
      "@source": "JVN"
    },
    {
      "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-0569",
      "@id": "CVE-2009-0569",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2009-0569",
      "@id": "CVE-2009-0569",
      "@source": "NVD"
    },
    {
      "#text": "http://www.ipa.go.jp/security/english/vuln/200902_becky_en.html",
      "@id": "Security Alert for Becky! Internet Mail Vulnerability",
      "@source": "IPA SECURITY ALERTS"
    },
    {
      "#text": "http://secunia.com/advisories/33892",
      "@id": "SA33892",
      "@source": "SECUNIA"
    },
    {
      "#text": "http://www.securityfocus.com/bid/33756",
      "@id": "33756",
      "@source": "BID"
    },
    {
      "#text": "http://xforce.iss.net/xforce/xfdb/48684",
      "@id": "48684",
      "@source": "XF"
    },
    {
      "#text": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html",
      "@id": "JVNDB-2009-000011",
      "@source": "JVNDB_Ja"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "Becky! Internet Mail buffer overflow vulnerability"
}

jvndb-2005-000772
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2008-05-21 00:00
Severity ?
() - -
Summary
Inappropriate interpretation of mailto URL scheme by mail client software
Details
The mailto URL scheme is used to designate the Internet email address on a web page. Specifying an email address and body text using the mailto URL scheme gives a template for a mail message. Many mail clients have a function to set a field specified by the mailto URL scheme in a mail header. RFC2368 defining the mailto URL scheme points out the followings in its Security Considerations section. - A mail client should never send anything without complete disclosure to the user of the full message created based on descriptions of the mailto URL scheme - It should explicitly display any headers along with the message destination. - It is inappropriate to set a header related to mail delivery based on descriptions of the mailto URL scheme However, some mail clients set the header related to mail delivery based on descriptions of the mailto URL scheme or do not explicitly display the full header. We published this issue on JVN in coordination with developers, to publicize the issue to users and mail client developers.
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2005/JVNDB-2005-000772.html",
  "dc:date": "2008-05-21T00:00+09:00",
  "dcterms:issued": "2008-05-21T00:00+09:00",
  "dcterms:modified": "2008-05-21T00:00+09:00",
  "description": "The mailto URL scheme is used to designate the Internet email address on a web page. Specifying an email address and body text using the mailto URL scheme gives a template for a mail message. Many mail clients have a function to set a field specified by the mailto URL scheme in a mail header.\r\n\r\nRFC2368 defining the mailto URL scheme points out the followings in its Security Considerations section.\r\n\r\n- A mail client should never send anything without complete disclosure to the user of the full message created based on descriptions of the mailto URL scheme\r\n- It should explicitly display any headers along with the message destination.\r\n- It is inappropriate to set a header related to mail delivery based on descriptions of the mailto URL scheme  \r\n\r\nHowever, some mail clients set the header related to mail delivery based on descriptions of the mailto URL scheme or do not explicitly display the full header.\r\n\r\nWe published this issue on JVN in coordination with developers, to publicize the issue to users and mail client developers.",
  "link": "https://jvndb.jvn.jp/en/contents/2005/JVNDB-2005-000772.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:allied_telesis_k.k.:at-mail_server",
      "@product": "AT-Mail Server",
      "@vendor": "Allied Telesis",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:hidemaru:hidemaru_mail",
      "@product": "Hidemaru Mail",
      "@vendor": "Saitoh Kikaku",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:shuriken",
      "@product": "Shuriken",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:misc:edcom_edmax",
      "@product": "EdMax",
      "@vendor": "Edcom Inc. ",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:misc:edcom_edmax_free",
      "@product": "EdMax Free",
      "@vendor": "Edcom Inc. ",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:misc:orange_winbiff",
      "@product": "Winbiff",
      "@vendor": "Orangesoft Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:rimarts_inc.:becky_internet_mail",
      "@product": "Becky! Internet Mail",
      "@vendor": "RIMARTS",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "4.3",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2005-000772",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVNFCAD9BD8/index.html",
      "@id": "JVN#FCAD9BD8",
      "@source": "JVN"
    },
    {
      "#text": "http://www.ietf.org/rfc/rfc2368.txt",
      "@id": "RFC2368: The mailto URL scheme",
      "@source": "IETF"
    }
  ],
  "title": "Inappropriate interpretation of mailto URL scheme by mail client software"
}

jvndb-2004-000590
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2008-05-21 00:00
Severity ?
() - -
Summary
Becky! Internet Mail vulnerability in S/MIME signature verification
Details
Becky! Internet Mail contains the following vulnerabilities in the S/MIME signature verification: - S/MIME signature verification does not verify the certification path. - S/MIME signature verification does not verify the certification expiration date.
References
Impacted products
RIMARTSBecky! Internet Mail
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2004/JVNDB-2004-000590.html",
  "dc:date": "2008-05-21T00:00+09:00",
  "dcterms:issued": "2008-05-21T00:00+09:00",
  "dcterms:modified": "2008-05-21T00:00+09:00",
  "description": "Becky! Internet Mail contains the following vulnerabilities in the S/MIME signature verification:\r\n\r\n- S/MIME signature verification does not verify the certification path.\r\n- S/MIME signature verification does not verify the certification expiration date.",
  "link": "https://jvndb.jvn.jp/en/contents/2004/JVNDB-2004-000590.html",
  "sec:cpe": {
    "#text": "cpe:/a:rimarts_inc.:becky_internet_mail",
    "@product": "Becky! Internet Mail",
    "@vendor": "RIMARTS",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2004-000590",
  "sec:references": {
    "#text": "http://jvn.jp/en/jp/JVN7C9208F1/index.html",
    "@id": "JVN#7C9208F1",
    "@source": "JVN"
  },
  "title": "Becky! Internet Mail vulnerability in S/MIME signature verification"
}

jvndb-2014-000071
Vulnerability from jvndb
Published
2014-07-08 14:53
Modified
2014-07-10 17:05
Severity ?
() - -
Summary
Becky! Internet Mail vulnerable to buffer overflow
Details
Becky! Internet Mail contains a buffer overflow vulnerability. Becky! Internet Mail contains an issue in processing responses from a POP3 server, which may result in a buffer overflow vulnerability. Shingo HAYASHI of Cyber Defense Institute, Inc reported this vulnerability to IPA. JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Impacted products
RIMARTSBecky! Internet Mail
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000071.html",
  "dc:date": "2014-07-10T17:05+09:00",
  "dcterms:issued": "2014-07-08T14:53+09:00",
  "dcterms:modified": "2014-07-10T17:05+09:00",
  "description": "Becky! Internet Mail contains a buffer overflow vulnerability.\r\n\r\nBecky! Internet Mail contains an issue in processing responses from a POP3 server, which may result in a buffer overflow vulnerability.\r\n\r\nShingo HAYASHI of Cyber Defense Institute, Inc reported this vulnerability to IPA.\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2014/JVNDB-2014-000071.html",
  "sec:cpe": {
    "#text": "cpe:/a:rimarts_inc.:becky_internet_mail",
    "@product": "Becky! Internet Mail",
    "@vendor": "RIMARTS",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "5.1",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:H/Au:N/C:P/I:P/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2014-000071",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN35376006/index.html",
      "@id": "JVN#35376006",
      "@source": "JVN"
    },
    {
      "#text": "https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-3891",
      "@id": "CVE-2014-3891",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2014-3891",
      "@id": "CVE-2014-3891",
      "@source": "NVD"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    }
  ],
  "title": "Becky! Internet Mail vulnerable to buffer overflow"
}