All the vulnerabilites related to FUJITSU - SystemWalker IT BudgetMGR
var-200912-0451
Vulnerability from variot

Fujitsu Interstage and Systemwalker related products have the vulnerabilities listed below: - A buffer overflow vulnerability that can occur when the SSL server verifies the client's certificate. - A vulnerability that makes it possible to make an SSL connection using a server or client certificate issued by the old CA certificate after the CA certificate is renewed, regardless of the settings of the certificate environment variables. - A vulnerability where the depletion of resources, such as file descriptors, can occur on the SSL server.A remote attacker can cause a denial of service (DoS) condition or make an SSL connection using a fake certificate. ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

For more information visit: http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com


TITLE: Fujitsu Products SSL Implementation Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA37989

VERIFY ADVISORY: http://secunia.com/advisories/37989/

DESCRIPTION: Some vulnerabilities have been reported in multiple Fujitsu products, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

3) An error in the implementation of the SSL server can be exploited to exhaust e.g. available file descriptors.

Please see the vendor's advisory for a full list of affected products.

SOLUTION: Apply patches. Please see the vendor's advisory for details.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: Fujitsu: http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_systemwalker_ssl_200901.html

OTHER REFERENCES: JVN: http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-002358.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200912-0451",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "infodirectory",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "infoprovider pro",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "infoproxy",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "infoproxy for middleware",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "interstage",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "interstage apcoordinator",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "interstage application framework suite",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "interstage application server",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "interstage apworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "interstage business application manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "interstage form coordinator syomei option",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "interstage security director",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "interstage traffic director",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "linkexpress",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "safeauthor",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "safegate",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "safegate client",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "safegate syutyu kanri",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "symfoware universal data interchanger",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "systemwalker centric manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "systemwalker centricmgr-a",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "systemwalker desktop inspection",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "systemwalker desktop patrol",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "systemwalker formcoordinator syomei option",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "systemwalker it budget manager",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "systemwalker it budgetmgr",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "systemwalker software delivery",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "systemwalker/infodirectory",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "trademaster",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "trmaster",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002358"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:fujitsu:infodirectory",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:infoprovider_pro",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:infoproxy",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:infoproxy_for_middleware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage_apcoordinator",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage_application_framework_suite",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage_application_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage_apworks",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage_business_application_manager",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage_form_coordinator_syomei_option",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage_security_director",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage_traffic_director",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:linkexpress",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:safeauthor",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:safegate",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:safegate_client",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:safegate_syutyu_kanri",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:symfoware_universal_data_interchanger",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_centric_manager",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_centricmgr-a",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_desktop_inspection",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_desktop_patrol",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_formcoordinator_syomei_option",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_it_budget_manager",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_it_budgetmgr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_software_delivery",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_infodirectory",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:trademaster",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:trmaster",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002358"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Secunia",
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "84267"
      }
    ],
    "trust": 0.1
  },
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2009-002358",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "IPA",
            "id": "JVNDB-2009-002358",
            "trust": 0.8,
            "value": "Medium"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002358"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Fujitsu Interstage and Systemwalker related products have the vulnerabilities listed below: - A buffer overflow vulnerability that can occur when the SSL server verifies the client\u0027s certificate. - A vulnerability that makes it possible to make an SSL connection using a server or client certificate issued by the old CA certificate after the CA certificate is renewed, regardless of the settings of the certificate environment variables. - A vulnerability where the depletion of resources, such as file descriptors, can occur on the SSL server.A remote attacker can cause a denial of service (DoS) condition or make an SSL connection using a fake certificate. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nFujitsu Products SSL Implementation Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA37989\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37989/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in multiple Fujitsu products,\nwhich can be exploited by malicious people to bypass certain security\nrestrictions or cause a DoS (Denial of Service). \n\n3) An error in the implementation of the SSL server can be exploited\nto exhaust e.g. available file descriptors. \n\nPlease see the vendor\u0027s advisory for a full list of affected\nproducts. \n\nSOLUTION:\nApply patches. Please see the vendor\u0027s advisory for details. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nFujitsu:\nhttp://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_systemwalker_ssl_200901.html\n\nOTHER REFERENCES:\nJVN:\nhttp://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-002358.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002358"
      },
      {
        "db": "PACKETSTORM",
        "id": "84267"
      }
    ],
    "trust": 0.81
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002358",
        "trust": 0.9
      },
      {
        "db": "SECUNIA",
        "id": "37989",
        "trust": 0.2
      },
      {
        "db": "PACKETSTORM",
        "id": "84267",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002358"
      },
      {
        "db": "PACKETSTORM",
        "id": "84267"
      }
    ]
  },
  "id": "VAR-200912-0451",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VARIoT devices database",
        "id": null
      }
    ],
    "trust": 0.1875
  },
  "last_update_date": "2022-05-17T22:49:29.265000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "interstage_systemwalker_ssl_200901",
        "trust": 0.8,
        "url": "http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_systemwalker_ssl_200901.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002358"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "CWE-119",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-399",
        "trust": 0.8
      },
      {
        "problemtype": "CWE-287",
        "trust": 0.8
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002358"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/37989/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/business_solutions/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-002358.html"
      },
      {
        "trust": 0.1,
        "url": "http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_systemwalker_ssl_200901.html"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/about_secunia_advisories/"
      }
    ],
    "sources": [
      {
        "db": "PACKETSTORM",
        "id": "84267"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002358"
      },
      {
        "db": "PACKETSTORM",
        "id": "84267"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-12-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-002358"
      },
      {
        "date": "2009-12-29T10:25:23",
        "db": "PACKETSTORM",
        "id": "84267"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-12-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2009-002358"
      }
    ]
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Fujitsu Interstage and Systemwalker SSL Vulnerabilities",
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2009-002358"
      }
    ],
    "trust": 0.8
  }
}

var-200310-0072
Vulnerability from variot

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. sendmail A buffer overflow vulnerability was discovered in the email address parsing process. This vulnerability CERT Advisory CA-2003-07, CA-2003-12 This is a new vulnerability that differs from the vulnerability reported in. As for the vulnerability, there is a possibility that a third party may obtain administrator authority from a remote location. This problem, sendmail Occurs by receiving a message with a maliciously configured email address. For this reason, LAN Is running on a host sendmail Even other MTA (Mail Transfer Agent) If you receive a malicious message relayed from, you may be affected by the vulnerability.Service operation interruption (denial-of-service, DoS) An attacker or a remote third party may gain administrative privileges. This issue is different than the vulnerability described in BID 7230. Sendmail is one of the most popular mail transfer agents (MTAs) on the Internet. The local exploitation method on Linux can use recipient.c and sendtolist() to overwrite the pointer with the data submitted by the user. When calling the free() function, the command may be redirected, and the attacker can construct a malicious email message and submit it to Sendmail for analysis. Execute arbitrary commands on the system with Sendmail process privileges. There may also be other exploit methods, and it is also possible to exploit this vulnerability remotely

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200310-0072",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.6.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 2.1,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "workstation",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "8.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "7.0"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.5"
      },
      {
        "model": "server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.1"
      },
      {
        "model": "advanced server",
        "scope": "eq",
        "trust": 1.9,
        "vendor": "turbolinux",
        "version": "6.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.6"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "netbsd",
        "version": "1.4.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "1.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "0.7"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "gentoo",
        "version": "0.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.5"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.21m"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.3"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g_pk3_bl17"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "9.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.18m"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.1a"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk3_bl17"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk4_bl18"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk2_bl2"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.0.4"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.18f"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.6"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.19m"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.17m"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b_pk2_bl22"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.19f"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.20m"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk4_bl21"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.4"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.7"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.17f"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk5_bl19"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk3_bl3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk6_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.21f"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g_pk4_bl22"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk8_bl22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.00"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f"
      },
      {
        "model": "pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sgi",
        "version": "6.5.20f"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk5_bl23"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "mac os x server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.4"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2.3"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk6_bl20"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "3.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b_pk1_bl1"
      },
      {
        "model": "pro",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk7_bl18"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.8"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.9"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk1_bl1"
      },
      {
        "model": "mac os x",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "apple",
        "version": "10.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "8.0"
      },
      {
        "model": "freebsd",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "conectiva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm eserver",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mandrakesoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "secure computing",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sendmail consortium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "turbolinux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wirex",
        "version": null
      },
      {
        "model": "cobalt raq4",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "openlinux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "3.1.1 (server)"
      },
      {
        "model": "open unix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "8.0.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (sparc)"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "3.0.x (solaris"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.00"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "linux"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.0"
      },
      {
        "model": "systemwalker it budgetmgr",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix edition )"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "8.0"
      },
      {
        "model": "for nt",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.6.x"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.3"
      },
      {
        "model": "systemwalker listcreator",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "openbsd",
        "version": "3.3"
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.12.9 and earlier"
      },
      {
        "model": "for nt",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "version 3.0.x"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "7.1.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.2.xj (windows nt/2000 edition )"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.5"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.2.x (solaris"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.1"
      },
      {
        "model": "openbsd",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "openbsd",
        "version": "version"
      },
      {
        "model": "linux advanced workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "linux"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix edition )"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "9"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.11"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "windows nt/2000"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.2"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "1.3 (windows 2000 edition )"
      },
      {
        "model": "teamware office",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.22"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.23"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sgi",
        "version": "6.5 (6.5.15 - 6.5.21f)"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.1.x (solaris"
      },
      {
        "model": "openlinux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "3.1.1 (workstation)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "3.1.x (solaris"
      },
      {
        "model": "bsd/os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "fore tune",
        "version": "5.0"
      },
      {
        "model": "cobalt qube3",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "interstage office square",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (ws)"
      },
      {
        "model": "openbsd",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "openbsd",
        "version": "3.2"
      },
      {
        "model": "gnu/linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "debian",
        "version": "3.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.1.x (hp-ux edition )"
      },
      {
        "model": "freebsd",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "freebsd",
        "version": "version"
      },
      {
        "model": "asianux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "cybertrust",
        "version": "2.0"
      },
      {
        "model": "unixware",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sco",
        "version": "7.1.3"
      },
      {
        "model": "cobalt raqxtr",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (x86)"
      },
      {
        "model": "linux 5.0",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "turbolinux advanced server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (as)"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.04"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "bsd/os",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "fore tune",
        "version": "4.3.1"
      },
      {
        "model": "gnu/linux",
        "scope": "lt",
        "trust": 0.8,
        "vendor": "debian",
        "version": "version"
      },
      {
        "model": "enterprise linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "2.1 (es)"
      },
      {
        "model": "systemwalker listworks",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.0.x (solaris"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "s390 linux edition )"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "advanced message server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "1.2 (solaris"
      },
      {
        "model": "systemwalker ip netmgr",
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "s390 linux edition )"
      },
      {
        "model": "cobalt raq550",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "aix"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "ibm",
        "version": "4.3"
      },
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "9"
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 7.0 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "solaris 2.6 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.0.7"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "550"
      },
      {
        "model": "cobalt raq",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "4"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.21"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.21"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "irix m",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "irix f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "inc sendmail pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "inc sendmail pro",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.3"
      },
      {
        "model": "inc sendmail advanced message server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "1.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.9"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "consortium sendmail beta7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail beta10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.8.8"
      },
      {
        "model": "beta",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5x86"
      },
      {
        "model": "sh3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "linux rc3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux rc2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux rc1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.4"
      },
      {
        "model": "linux a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "gentoo",
        "version": "1.1"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "-release-p5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.1"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "-release-p14",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "5.0"
      },
      {
        "model": "-prerelease",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.9"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "-release-p7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.8"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "-release-p17",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.7"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "-release-p20",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.6"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "-release-p32",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.5"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "-release-p42",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.4"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "-release-p38",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.3"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "4.0"
      },
      {
        "model": "-releng",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "freebsd",
        "version": "3.0"
      },
      {
        "model": "tru64 b pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 b pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 g pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 g pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f pk8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f pk7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.6"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.22"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.10"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/o:debian:debian_linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:freebsd:freebsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:ibm:aix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:netbsd:netbsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:openbsd:openbsd",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sco:open_unix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sco:openlinux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sco:unixware",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sgi:irix",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:misc:miraclelinux_asianux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_qube_3",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_4",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_550",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:sun:sun_cobalt_raq_xtr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sun:linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:sun:solaris",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_advanced_message_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_for_nt",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:sendmail:sendmail_switch",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_advanced_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:turbolinux:turbolinux_workstation",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:hp:hp-ux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:bsdi:bsd_os",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:enterprise_linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:linux",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/o:redhat:linux_advanced_workstation",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:interstage_office_square",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_ip_netmgr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_it_budgetmgr",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_listcreator",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:systemwalker_listworks",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:fujitsu:teamware_office",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michal Zalewski\u203b lcamtuf@echelon.pl",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2003-0694",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2003-0694",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 1.9,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-7519",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2003-0694",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#784980",
            "trust": 0.8,
            "value": "36.72"
          },
          {
            "author": "NVD",
            "id": "CVE-2003-0694",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200310-019",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-7519",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2003-0694",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. sendmail A buffer overflow vulnerability was discovered in the email address parsing process. This vulnerability CERT Advisory CA-2003-07, CA-2003-12 This is a new vulnerability that differs from the vulnerability reported in. As for the vulnerability, there is a possibility that a third party may obtain administrator authority from a remote location. This problem, sendmail Occurs by receiving a message with a maliciously configured email address. For this reason, LAN Is running on a host sendmail Even other MTA (Mail Transfer Agent) If you receive a malicious message relayed from, you may be affected by the vulnerability.Service operation interruption (denial-of-service, DoS) An attacker or a remote third party may gain administrative privileges.  This issue is different than the vulnerability described in BID 7230. Sendmail is one of the most popular mail transfer agents (MTAs) on the Internet. The local exploitation method on Linux can use recipient.c and sendtolist() to overwrite the pointer with the data submitted by the user. When calling the free() function, the command may be redirected, and the attacker can construct a malicious email message and submit it to Sendmail for analysis. Execute arbitrary commands on the system with Sendmail process privileges. There may also be other exploit methods, and it is also possible to exploit this vulnerability remotely",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      },
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      }
    ],
    "trust": 2.79
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#784980",
        "trust": 3.4
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "8641",
        "trust": 1.3
      },
      {
        "db": "XF",
        "id": "13204",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019",
        "trust": 0.7
      },
      {
        "db": "CONECTIVA",
        "id": "CLA-2003:742",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:284",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:283",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2003-25",
        "trust": 0.6
      },
      {
        "db": "VULNWATCH",
        "id": "20030917 ZALEWSKI ADVISORY - SENDMAIL 8.12.9 PRESCAN BUG",
        "trust": 0.6
      },
      {
        "db": "SCO",
        "id": "SCOSA-2004.11",
        "trust": 0.6
      },
      {
        "db": "MANDRAKE",
        "id": "MDKSA-2003:092",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030917 GLSA: SENDMAIL (200309-13)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030917 [SLACKWARE-SECURITY] SENDMAIL VULNERABILITIES FIXED (SSA:2003-260-02)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030917 SENDMAIL 8.12.9 PRESCAN BUG (A NEW ONE) [CAN-2003-0694]",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030919 [OPENPKG-SA-2003.041] OPENPKG SECURITY ADVISORY (SENDMAIL)",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:603",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:2975",
        "trust": 0.6
      },
      {
        "db": "OVAL",
        "id": "OVAL:ORG.MITRE.OVAL:DEF:572",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20030917 SENDMAIL 8.12.9 PRESCAN BUG (A NEW ONE) [CAN-2003-0694]",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-384",
        "trust": 0.6
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "id": "VAR-200310-0072",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-11-29T20:05:21.307000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "ca-2003-25",
        "trust": 0.8,
        "url": "http://software.fujitsu.com/jp/security/vulnerabilities/cert/cert2003.html#ca-2003-25"
      },
      {
        "title": "DSA-384-1",
        "trust": 0.8,
        "url": "http://www.debian.org/security/2003/dsa-384"
      },
      {
        "title": "FreeBSD-SA-03:13.sendmail ",
        "trust": 0.8,
        "url": "http://security.freebsd.org/advisories/FreeBSD-SA-03:13.sendmail.asc"
      },
      {
        "title": "HPSBUX00281",
        "trust": 0.8,
        "url": "http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en\u0026cc=us\u0026objectID=c01035741"
      },
      {
        "title": "IY48657",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY48657"
      },
      {
        "title": "IY48659",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY48659"
      },
      {
        "title": "IY48658",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/support/docview.wss?uid=isg1IY48658"
      },
      {
        "title": "MSS-OAR-E01-2003.1473.1",
        "trust": 0.8,
        "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/MSS/MSS-OAR-E01-2003.1473.1"
      },
      {
        "title": "sendmail (V2.x)",
        "trust": 0.8,
        "url": "http://www.miraclelinux.com/update/linux/list.php?errata_id=150"
      },
      {
        "title": "NetBSD-SA2003-016",
        "trust": 0.8,
        "url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-016.txt.asc"
      },
      {
        "title": "018: SECURITY FIX: September 17, 2003",
        "trust": 0.8,
        "url": "http://www.openbsd.org/errata32.html#sendmail4"
      },
      {
        "title": "005: SECURITY FIX: September 17, 2003",
        "trust": 0.8,
        "url": "http://www.openbsd.org/errata33.html#sendmail"
      },
      {
        "title": "RHSA-2003:283",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2003-283.html"
      },
      {
        "title": "RHSA-2003:284",
        "trust": 0.8,
        "url": "https://rhn.redhat.com/errata/RHSA-2003-284.html"
      },
      {
        "title": "CSSA-2003-036.0",
        "trust": 0.8,
        "url": "ftp://ftp.sco.com/pub/security/OpenLinux/CSSA-2003-036.0.txt"
      },
      {
        "title": "CSSA-2003-SCO.23.1",
        "trust": 0.8,
        "url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.23/CSSA-2003-SCO.23.txt"
      },
      {
        "title": "8.12.10",
        "trust": 0.8,
        "url": "http://www.sendmail.org/8.12.10.html"
      },
      {
        "title": "2003-9-17",
        "trust": 0.8,
        "url": "http://www.sendmail.com/security/"
      },
      {
        "title": "20030903-01-P",
        "trust": 0.8,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20030903-01-P.asc"
      },
      {
        "title": "56922",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-1"
      },
      {
        "title": "56860",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56860-1"
      },
      {
        "title": "56922",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-3"
      },
      {
        "title": "56860",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56860-3"
      },
      {
        "title": "XTR Sendmail Security Update 1.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "550 Sendmail Security Update 0.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "4 Sendmail Security Update 2.0.2",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "TLSA-2003-52",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2003/TLSA-2003-52.txt"
      },
      {
        "title": "Sendmail Inc. Information for VU#784980",
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/AAMN-5RHQ64"
      },
      {
        "title": "M500-012",
        "trust": 0.8,
        "url": "ftp://ftp.foretune.co.jp/pub/BSDOS/patches-5.0/M500-012.ia32"
      },
      {
        "title": "M431-011",
        "trust": 0.8,
        "url": "ftp://ftp.foretune.co.jp/pub/BSDOS/patches-4.3.1/i386/M431-011"
      },
      {
        "title": "RHSA-2003:283",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-283J.html"
      },
      {
        "title": "RHSA-2003:284",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/RHSA/RHSA-2003-284J.html"
      },
      {
        "title": "TLSA-2003-52",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2003/TLSA-2003-52j.txt"
      },
      {
        "title": "Debian Security Advisories: DSA-384-1 sendmail -- buffer overflows",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=243b978e3f17d13dd590ac7cfc4a472f"
      },
      {
        "title": "cumes",
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes "
      },
      {
        "title": "x0rzEQGRP",
        "trust": 0.1,
        "url": "https://github.com/happysmack/x0rzEQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Nekkidso/EQGRP "
      },
      {
        "title": "test",
        "trust": 0.1,
        "url": "https://github.com/DevKosov/test "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/hackcrypto/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Ninja-Tw1sT/EQGRP "
      },
      {
        "title": "leaked2",
        "trust": 0.1,
        "url": "https://github.com/kongjiexi/leaked2 "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/391861737/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Muhammd/EQGRP "
      },
      {
        "title": "ShadowBrokersFiles",
        "trust": 0.1,
        "url": "https://github.com/R3K1NG/ShadowBrokersFiles "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/CKmaenn/EQGRP "
      },
      {
        "title": "EQGRP_Linux",
        "trust": 0.1,
        "url": "https://github.com/CybernetiX-S3C/EQGRP_Linux "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/IHA114/EQGRP "
      },
      {
        "title": "ShadowBrokersFiles",
        "trust": 0.1,
        "url": "https://github.com/antiscammerarmy/ShadowBrokersFiles "
      },
      {
        "title": "shadowbrokerstuff",
        "trust": 0.1,
        "url": "https://github.com/thetrentusdev/shadowbrokerstuff "
      },
      {
        "title": "bdhglopoj",
        "trust": 0.1,
        "url": "https://github.com/maxcvnd/bdhglopoj "
      },
      {
        "title": "shadowbrokerstuff",
        "trust": 0.1,
        "url": "https://github.com/shakenetwork/shadowbrokerstuff "
      },
      {
        "title": "x0rz-EQGRP",
        "trust": 0.1,
        "url": "https://github.com/r3p3r/x0rz-EQGRP "
      },
      {
        "title": "ShadowBrokersStuff",
        "trust": 0.1,
        "url": "https://github.com/thetrentus/ShadowBrokersStuff "
      },
      {
        "title": "EQ1",
        "trust": 0.1,
        "url": "https://github.com/thePevertedSpartan/EQ1 "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Badbug6/EQGRP "
      },
      {
        "title": "EQGRP-nasa",
        "trust": 0.1,
        "url": "https://github.com/Soldie/EQGRP-nasa "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/Mofty/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/thetrentus/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/NamanGangwar/EQGRP "
      },
      {
        "title": "EQGRP",
        "trust": 0.1,
        "url": "https://github.com/x0rz/EQGRP "
      },
      {
        "title": "SB--.-HACK-the-EQGRP-1",
        "trust": 0.1,
        "url": "https://github.com/cipherreborn/SB--.-HACK-the-EQGRP-1 "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.9,
        "url": "http://www.cert.org/advisories/ca-2003-25.html"
      },
      {
        "trust": 3.7,
        "url": "http://www.kb.cert.org/vuls/id/784980"
      },
      {
        "trust": 3.6,
        "url": "http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html"
      },
      {
        "trust": 3.6,
        "url": "http://www.sendmail.org/8.12.10.html"
      },
      {
        "trust": 2.8,
        "url": "http://www.debian.org/security/2003/dsa-384"
      },
      {
        "trust": 2.8,
        "url": "http://www.mandriva.com/security/advisories?name=mdksa-2003:092"
      },
      {
        "trust": 2.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-283.html"
      },
      {
        "trust": 2.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-284.html"
      },
      {
        "trust": 2.8,
        "url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.11/scosa-2004.11.txt"
      },
      {
        "trust": 2.8,
        "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html"
      },
      {
        "trust": 2.7,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742"
      },
      {
        "trust": 2.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2975"
      },
      {
        "trust": 2.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a572"
      },
      {
        "trust": 2.2,
        "url": "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a603"
      },
      {
        "trust": 2.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2"
      },
      {
        "trust": 2.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106382859407683\u0026w=2"
      },
      {
        "trust": 2.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106381604923204\u0026w=2"
      },
      {
        "trust": 2.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2"
      },
      {
        "trust": 0.9,
        "url": "http://www.securityfocus.com/bid/8641"
      },
      {
        "trust": 0.8,
        "url": "http://archives.neohapsis.com/archives/sendmail/2003-q3/0002.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org/patches/parse8.359.2.8"
      },
      {
        "trust": 0.8,
        "url": "http://www.ciac.org/ciac/bulletins/n-149.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0694"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/13204"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr033901.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr034001.txt"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-25"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trca-2003-25"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0694"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030918_190150.html"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106398718909274\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106383437615742\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106382859407683\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=106381604923204\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:603"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:572"
      },
      {
        "trust": 0.6,
        "url": "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2975"
      },
      {
        "trust": 0.3,
        "url": "http://www-1.ibm.com/servers/aix/"
      },
      {
        "trust": 0.3,
        "url": "http://distro.conectiva.com.br/atualizacoes/index.php?id=a\u0026anuncio=000746"
      },
      {
        "trust": 0.3,
        "url": "http://www.sendmail.org/"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56860"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56922"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/qube3.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/patches/linux/security.html"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v4.0g/t64kit0020132-v40gb22-es-20031001.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-553-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-563-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-586-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-594-sendmail-ssrt3631.readme"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/337839"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106383437615742\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106381604923204\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106382859407683\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=106398718909274\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000742"
      },
      {
        "trust": 0.1,
        "url": ""
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/./dsa-384"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-17T00:00:00",
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "date": "2003-10-06T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "date": "2003-09-17T00:00:00",
        "db": "BID",
        "id": "8641"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "date": "2003-09-17T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "date": "2003-10-06T04:00:00",
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-29T00:00:00",
        "db": "CERT/CC",
        "id": "VU#784980"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-7519"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0694"
      },
      {
        "date": "2009-07-11T23:56:00",
        "db": "BID",
        "id": "8641"
      },
      {
        "date": "2007-08-28T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000278"
      },
      {
        "date": "2006-08-24T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      },
      {
        "date": "2024-11-20T23:45:19.030000",
        "db": "NVD",
        "id": "CVE-2003-0694"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sendmail prescan() buffer overflow vulnerability",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#784980"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "8641"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200310-019"
      }
    ],
    "trust": 0.9
  }
}

jvndb-2009-002358
Vulnerability from jvndb
Published
2009-12-28 11:19
Modified
2009-12-28 11:19
Severity ?
() - -
Summary
Fujitsu Interstage and Systemwalker SSL Vulnerabilities
Details
Fujitsu Interstage and Systemwalker related products have the vulnerabilities listed below: - A buffer overflow vulnerability that can occur when the SSL server verifies the client's certificate. - A vulnerability that makes it possible to make an SSL connection using a server or client certificate issued by the old CA certificate after the CA certificate is renewed, regardless of the settings of the certificate environment variables. - A vulnerability where the depletion of resources, such as file descriptors, can occur on the SSL server.
References
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-002358.html",
  "dc:date": "2009-12-28T11:19+09:00",
  "dcterms:issued": "2009-12-28T11:19+09:00",
  "dcterms:modified": "2009-12-28T11:19+09:00",
  "description": "Fujitsu Interstage and Systemwalker related products have the vulnerabilities listed below:\r\n- A buffer overflow vulnerability that can occur when the SSL server verifies the client\u0027s certificate.\r\n- A vulnerability that makes it possible to make an SSL connection using a server or client certificate issued by the old CA certificate after the CA certificate is renewed, regardless of the settings of the certificate environment variables.\r\n- A vulnerability where the depletion of resources, such as file descriptors, can occur on the SSL server.",
  "link": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-002358.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:fujitsu:infodirectory",
      "@product": "InfoDirectory",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:infoprovider_pro",
      "@product": "InfoProvider Pro",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:infoproxy",
      "@product": "InfoProxy",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:infoproxy_for_middleware",
      "@product": "InfoProxy for Middleware",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:interstage",
      "@product": "Interstage",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:interstage_apcoordinator",
      "@product": "Interstage Apcoordinator",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:interstage_application_framework_suite",
      "@product": "Interstage Application Framework Suite",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:interstage_application_server",
      "@product": "Interstage Application Server",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:interstage_apworks",
      "@product": "Interstage Apworks",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:interstage_business_application_manager",
      "@product": "Interstage Business Application Manager",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:interstage_form_coordinator_syomei_option",
      "@product": "Interstage Form Coordinator syomei option",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:interstage_security_director",
      "@product": "Interstage Security Director",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:interstage_traffic_director",
      "@product": "Interstage Traffic Director",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:linkexpress",
      "@product": "Linkexpress",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:safeauthor",
      "@product": "Safeauthor",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:safegate",
      "@product": "Safegate",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:safegate_client",
      "@product": "safegate Client",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:safegate_syutyu_kanri",
      "@product": "Safegate syutyu kanri",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:symfoware_universal_data_interchanger",
      "@product": "SymfoWARE Universal Data Interchanger",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:systemwalker_centricmgr-a",
      "@product": "Systemwalker CentricMGR-A",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:systemwalker_centric_manager",
      "@product": "Systemwalker Centric Manager",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:systemwalker_desktop_inspection",
      "@product": "Systemwalker Desktop Inspection",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:systemwalker_desktop_patrol",
      "@product": "Systemwalker Desktop Patrol",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:systemwalker_formcoordinator_syomei_option",
      "@product": "Systemwalker Formcoordinator syomei option",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:systemwalker_infodirectory",
      "@product": "SystemWalker/InfoDirectory",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:systemwalker_it_budgetmgr",
      "@product": "SystemWalker IT BudgetMGR",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:systemwalker_it_budget_manager",
      "@product": "Systemwalker IT Budget Manager",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:systemwalker_software_delivery",
      "@product": "Systemwalker Software Delivery",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:trademaster",
      "@product": "TRADEMASTER",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:fujitsu:trmaster",
      "@product": "TRMASTER",
      "@vendor": "FUJITSU",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2009-002358",
  "sec:references": [
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-119",
      "@title": "Buffer Errors(CWE-119)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-287",
      "@title": "Improper Authentication(CWE-287)"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-399",
      "@title": "Resource Management Errors(CWE-399)"
    }
  ],
  "title": "Fujitsu Interstage and Systemwalker SSL Vulnerabilities"
}