cve-2003-0694
Vulnerability from cvelistv5
Published
2003-09-18 04:00
Modified
2024-08-08 02:05
Severity ?
EPSS score ?
Summary
The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-08T02:05:11.329Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "name": "20030919 [OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM", "x_transferred" ], "url": "http://www.sendmail.org/8.12.10.html" }, { "name": "RHSA-2003:283", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-283.html" }, { "name": "20030917 Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]", "tags": [ "mailing-list", "x_refsource_FULLDISC", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html" }, { "name": "CA-2003-25", "tags": [ "third-party-advisory", "x_refsource_CERT", "x_transferred" ], "url": "http://www.cert.org/advisories/CA-2003-25.html" }, { "name": "VU#784980", "tags": [ "third-party-advisory", "x_refsource_CERT-VN", "x_transferred" ], "url": "http://www.kb.cert.org/vuls/id/784980" }, { "name": "MDKSA-2003:092", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE", "x_transferred" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:092" }, { "name": "oval:org.mitre.oval:def:603", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A603" }, { "name": "20030917 [slackware-security] Sendmail vulnerabilities fixed (SSA:2003-260-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106382859407683\u0026w=2" }, { "name": "DSA-384", "tags": [ "vendor-advisory", "x_refsource_DEBIAN", "x_transferred" ], "url": "http://www.debian.org/security/2003/dsa-384" }, { "name": "SCOSA-2004.11", "tags": [ "vendor-advisory", "x_refsource_SCO", "x_transferred" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt" }, { "name": "RHSA-2003:284", "tags": [ "vendor-advisory", "x_refsource_REDHAT", "x_transferred" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-284.html" }, { "name": "20030917 GLSA: sendmail (200309-13)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2" }, { "name": "20030917 Zalewski Advisory - Sendmail 8.12.9 prescan bug", "tags": [ "mailing-list", "x_refsource_VULNWATCH", "x_transferred" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html" }, { "name": "oval:org.mitre.oval:def:572", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A572" }, { "name": "20030917 Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ", "x_transferred" ], "url": "http://marc.info/?l=bugtraq\u0026m=106381604923204\u0026w=2" }, { "name": "oval:org.mitre.oval:def:2975", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL", "x_transferred" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2975" }, { "name": "CLA-2003:742", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA", "x_transferred" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "n/a", "vendor": "n/a", "versions": [ { "status": "affected", "version": "n/a" } ] } ], "datePublic": "2003-09-17T00:00:00", "descriptions": [ { "lang": "en", "value": "The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c." } ], "problemTypes": [ { "descriptions": [ { "description": "n/a", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2017-10-10T00:57:01", "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "shortName": "mitre" }, "references": [ { "name": "20030919 [OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2" }, { "tags": [ "x_refsource_CONFIRM" ], "url": "http://www.sendmail.org/8.12.10.html" }, { "name": "RHSA-2003:283", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-283.html" }, { "name": "20030917 Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]", "tags": [ "mailing-list", "x_refsource_FULLDISC" ], "url": "http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html" }, { "name": "CA-2003-25", "tags": [ "third-party-advisory", "x_refsource_CERT" ], "url": "http://www.cert.org/advisories/CA-2003-25.html" }, { "name": "VU#784980", "tags": [ "third-party-advisory", "x_refsource_CERT-VN" ], "url": "http://www.kb.cert.org/vuls/id/784980" }, { "name": "MDKSA-2003:092", "tags": [ "vendor-advisory", "x_refsource_MANDRAKE" ], "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:092" }, { "name": "oval:org.mitre.oval:def:603", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A603" }, { "name": "20030917 [slackware-security] Sendmail vulnerabilities fixed (SSA:2003-260-02)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=106382859407683\u0026w=2" }, { "name": "DSA-384", "tags": [ "vendor-advisory", "x_refsource_DEBIAN" ], "url": "http://www.debian.org/security/2003/dsa-384" }, { "name": "SCOSA-2004.11", "tags": [ "vendor-advisory", "x_refsource_SCO" ], "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt" }, { "name": "RHSA-2003:284", "tags": [ "vendor-advisory", "x_refsource_REDHAT" ], "url": "http://www.redhat.com/support/errata/RHSA-2003-284.html" }, { "name": "20030917 GLSA: sendmail (200309-13)", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2" }, { "name": "20030917 Zalewski Advisory - Sendmail 8.12.9 prescan bug", "tags": [ "mailing-list", "x_refsource_VULNWATCH" ], "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html" }, { "name": "oval:org.mitre.oval:def:572", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A572" }, { "name": "20030917 Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]", "tags": [ "mailing-list", "x_refsource_BUGTRAQ" ], "url": "http://marc.info/?l=bugtraq\u0026m=106381604923204\u0026w=2" }, { "name": "oval:org.mitre.oval:def:2975", "tags": [ "vdb-entry", "signature", "x_refsource_OVAL" ], "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2975" }, { "name": "CLA-2003:742", "tags": [ "vendor-advisory", "x_refsource_CONECTIVA" ], "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742" } ], "x_legacyV4Record": { "CVE_data_meta": { "ASSIGNER": "cve@mitre.org", "ID": "CVE-2003-0694", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "n/a", "version": { "version_data": [ { "version_value": "n/a" } ] } } ] }, "vendor_name": "n/a" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "n/a" } ] } ] }, "references": { "reference_data": [ { "name": "20030919 [OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2" }, { "name": "http://www.sendmail.org/8.12.10.html", "refsource": "CONFIRM", "url": "http://www.sendmail.org/8.12.10.html" }, { "name": "RHSA-2003:283", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-283.html" }, { "name": "20030917 Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]", "refsource": "FULLDISC", "url": "http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html" }, { "name": "CA-2003-25", "refsource": "CERT", "url": "http://www.cert.org/advisories/CA-2003-25.html" }, { "name": "VU#784980", "refsource": "CERT-VN", "url": "http://www.kb.cert.org/vuls/id/784980" }, { "name": "MDKSA-2003:092", "refsource": "MANDRAKE", "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2003:092" }, { "name": "oval:org.mitre.oval:def:603", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A603" }, { "name": "20030917 [slackware-security] Sendmail vulnerabilities fixed (SSA:2003-260-02)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=106382859407683\u0026w=2" }, { "name": "DSA-384", "refsource": "DEBIAN", "url": "http://www.debian.org/security/2003/dsa-384" }, { "name": "SCOSA-2004.11", "refsource": "SCO", "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt" }, { "name": "RHSA-2003:284", "refsource": "REDHAT", "url": "http://www.redhat.com/support/errata/RHSA-2003-284.html" }, { "name": "20030917 GLSA: sendmail (200309-13)", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2" }, { "name": "20030917 Zalewski Advisory - Sendmail 8.12.9 prescan bug", "refsource": "VULNWATCH", "url": "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html" }, { "name": "oval:org.mitre.oval:def:572", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A572" }, { "name": "20030917 Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]", "refsource": "BUGTRAQ", "url": "http://marc.info/?l=bugtraq\u0026m=106381604923204\u0026w=2" }, { "name": "oval:org.mitre.oval:def:2975", "refsource": "OVAL", "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2975" }, { "name": "CLA-2003:742", "refsource": "CONECTIVA", "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742" } ] } } } }, "cveMetadata": { "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca", "assignerShortName": "mitre", "cveId": "CVE-2003-0694", "datePublished": "2003-09-18T04:00:00", "dateReserved": "2003-08-14T00:00:00", "dateUpdated": "2024-08-08T02:05:11.329Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2003-0694\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2003-10-06T04:00:00.000\",\"lastModified\":\"2024-11-20T23:45:19.030\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.\"},{\"lang\":\"es\",\"value\":\"La funci\u00f3n de prescan en Sendmail 8.12.9 permite a atacantes remotos ejecutar c\u00f3digo arbitrario mediante ataques de desbordamiento de b\u00fafer, como se demostr\u00f3 usando la funci\u00f3n parseaddr en parseaddr.c.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":10.0,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":10.0,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"NVD-CWE-Other\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FABD33DF-FEC4-4519-B2ED-4E498A7329FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2455BE6E-7540-4545-B40A-0366BDA6AE7E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1CA16C02-3B8D-4188-898E-048A93F11ADA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0FF12CC4-C9CD-479A-8F85-8F947B5B60A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"623A2E07-2122-4ADE-9932-011DCA4396A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5C563EF-FDED-4193-A66A-06527878BB1D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B4A267D3-2F49-4E61-B2C9-D8ED2265665E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7199205A-B914-40A1-9C82-A9698511E3C2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BEC468AB-8B18-4169-8040-614A32444732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D30A1136-074A-460D-9794-DDD530626800\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76A9602B-8E5A-4BF4-81F5-D1152D09FCAD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFD0B100-D822-4EBF-8EC9-ADAB8141116B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"196D77DF-E6D4-46D0-BC2C-8804A587CA25\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B743E5A3-6B15-4877-9424-A1F1A4214B73\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"76A60742-7815-4658-A6F7-147AA48C24B6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A1A24F2-9C6B-4DF0-AB04-55D051812DD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"120271B8-08A9-4C21-A108-0DA61095A006\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"84E6ECDA-DF65-47FF-A42F-FD5C1D864FA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AA859AF-4E4E-4077-8E98-523E617A1DDC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9791650-C367-43B6-A0F4-5BB56CE10778\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8340DDA8-77DD-4AEB-B267-F86F64A851B3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"07DCBBEE-1DF0-40FE-B755-1FC35CF16788\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581626E7-47B5-4819-B34F-B6DFD07A12F9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8BBE9A4A-8AB9-4A97-A106-970FEB08952C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*\",\"matchCriteriaId\":\"BD99394C-5408-4A01-8D4E-417FFFFDE9C7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*\",\"matchCriteriaId\":\"AAB59A24-87DE-4CAD-A2BA-AFCC0B2A55B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*\",\"matchCriteriaId\":\"97D641EF-0B69-45A1-B85E-3C9C93AB9D42\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*\",\"matchCriteriaId\":\"8972211B-6A5B-4095-9CBB-CEF4C23C9C65\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*\",\"matchCriteriaId\":\"8F81A2AD-90A0-4B97-86A3-92690A0FCA71\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"598F74BA-2B71-435E-92B8-9DEADB3311A5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"79A46DF2-8EEB-40C8-B1CA-01BC064BD25E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"581E5904-1A2B-49FF-BE3F-D42019AD816B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B6CC4C83-4FB9-4344-AFCB-C260659F81DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CAF763B4-58E3-4868-8C92-47DE3E4E5F40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6FEB3923-8F4B-4523-84F9-17D1CFA37F8C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58CD19B4-4BFD-4DE8-B21F-6B6CDE6793C5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B82BBB7-CD72-4A33-97D4-B1E51A595323\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6C1D6A40-5DD1-481C-AF85-85705FCE3680\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_pro:8.9.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A9371E42-3A43-4E60-9C03-841B5901AF5D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_pro:8.9.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E172E270-E0EE-49C6-AEF7-B533CD88F67D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5492A89B-8140-4CF7-BE81-09C25A64373A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2A6D5AF-2134-4EC5-B53A-CE95B5505325\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B5FE819-E570-4AEE-BF0C-B9B1960A1AB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"913AF73A-F6DE-4FAF-8A09-02CD33784B27\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"661A9B85-09EE-4D38-9160-8EEA6BE07BD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28941D4-7D1E-4BF9-8E2F-C951978424E9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DD930C49-512B-4114-8A97-80B1816CFCFA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7E8553E3-578B-4BE3-BBAD-5589338586E6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E7EE5C8E-8E2E-4C98-B8C5-B590E44B1EAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A3930ED-DE49-4F01-A904-5D66E34832F4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A3A51855-94DD-4F2E-BFF8-4ABE4613F962\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56B76FFE-90CB-4C11-9E9D-FFA896482628\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"74C77927-A67A-4C1B-BB80-18148E1F0FE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C9D22E3-18F8-42F9-993E-81E832B0B125\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BABB5CA-26F4-4DB6-9D43-1C82751DCCA1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F323395B-4549-4B54-8BBF-66B1B1B3F563\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BD69805-D021-4DCC-9FB6-A0BEA721408A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B13C07CC-F615-4F30-B532-4BF6F02F84DF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EED22734-8AAC-4897-BB71-438E19B8A005\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEA9C28F-18E6-4199-9740-FAB00563EBF7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6E63313-9533-478D-ACC0-C050FBA3EACF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA0A7D5D-BDD9-45F8-9BE7-3B01D70C8CC1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"61370032-AB21-4E93-B143-A92A342AFB1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C833FC19-D913-4C62-B14A-E1B3845D0275\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B90188D6-6C57-45C2-B266-50D65B4D33E4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39DD839E-159B-43FD-A1E6-A22EE658BEE0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE9CF799-3B52-4694-A706-37FA08EC9ABF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4E5A5AD7-F8AD-448F-8125-ACB0E7BA0A4B\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CDCF4FB3-F781-46D5-BEE7-485B3DC78B83\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE52A344-8B07-480D-A57F-B1F6E6574F3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56CC0444-570C-4BB5-B53A-C5CA0BD87935\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"62E3EED7-FE30-4620-B40B-9CC49B77408A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5AFD8BC6-4893-4D9D-A26E-27AAC864F94B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BD1F9A1-5ADB-451D-9525-D545E42D2B8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D7A24978-2891-425C-ACF6-E8F5C839C54A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00AE033B-5F16-4262-A397-02D7450189B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2E831F3E-A980-47AF-BD05-2DB1A14689B4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"36991737-904F-4B26-AEE2-7B30411279E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7EE6036-1A18-43F1-8A92-7DF39E1516E3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"620ECFC8-293D-4C2B-9698-67185BB6E2EF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1F14A45-BDDB-4C12-9370-D5241975A928\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"46BC34D4-A1E8-4E01-982D-EAF03A0EB886\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB2B5B59-B0CD-4F49-870B-F8F8BE902965\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F9A4900F-7A0B-441E-967D-45B1A051A5B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F41B68A9-C4EF-47F5-BE84-BD20C073C2D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:4.0f_pk8_bl22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1679FFED-8C4B-4B16-8B03-3992CC0F4704\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75546AD4-15DD-45FD-AFFB-8A59CB8D401C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"38B11F9E-64EE-47D1-A341-62F54382227C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:4.0g_pk4_bl22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"690B68FC-4548-4D34-8BC7-7EAFD73C9F68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E296E409-EF32-48FC-88CB-C38C7CF4A239\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE0BEA96-837B-4699-BE2E-CCD8F8F3CF38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E4DFD7B-4A10-4991-AC26-C8A957E87009\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0EA62CD1-19EA-46D8-9423-BFFF9FC8CA3E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"881FCB3C-DAD8-4883-B185-19A61B76102B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B9413090-D930-49DB-B7ED-7035C717B821\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"168C607C-6170-4936-9A53-AE3AAEBD79F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A7793736-B551-428D-8A2F-291968E212FC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3AB7AD47-5AF1-4CE0-A295-48567F991EAA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3ADBC08D-88E1-41BE-A139-F76D3CEA3BA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"972010F3-B97C-4A8F-9EFC-42F572AE7D94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"55E0D6B2-C319-4DD4-AB4C-F2F35F7806F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCEFCB5E-D7DF-48BF-B62A-081C4799F5A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:compaq:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A8C556B-8896-4D37-A9DD-2DF1C648F7F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:3.0:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0A3F7B6-2878-40C0-B59C-EBA8D171D2F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"A442DE97-4485-4D95-B95D-58947585E455\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*\",\"matchCriteriaId\":\"3BA1504C-14FE-4C21-A801-944041F2946F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"21B69535-4FB6-4FAD-AAA6-C790FF82EFAF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*\",\"matchCriteriaId\":\"6F4AC452-6042-409D-8673-ACAD108EE3B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"2FE1009B-371A-48E2-A456-935A1F0B7D0D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BCD9C12-EDAB-473F-9CC5-04F06B413720\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"58EBC5C8-5CA8-4881-A036-179FDEBA3CA4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*\",\"matchCriteriaId\":\"58288F0F-B4CE-445C-AD93-DA73E3AD6FC3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"CC96FBA9-6A65-4CC7-BE68-ADAF450ABE21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*\",\"matchCriteriaId\":\"FA699BB4-94AA-40E6-A6B6-33E3D416CDA7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFDA151E-E614-4A24-A34D-B6D5309110CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F3B4BA2-8A61-4F9A-8E46-7FA80E7F5514\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"2D33C6EF-DBE1-4943-83E4-1F10670DAC6E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AE93D3D-34B4-47B7-A784-61F4479FF5A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*\",\"matchCriteriaId\":\"51A612F6-E4EB-4E34-8F55-79E16C74758E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"5C19B266-8FE7-49ED-8678-2D522257491D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*\",\"matchCriteriaId\":\"FEC7B38F-C6FB-4213-AE18-2D039A4D8E7A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A5309ED-D84F-4F52-9864-5B0FEEEE5022\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"980553F2-8662-47CF-95F0-645141746AEA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"40EBF1CD-B392-4262-8F06-2C784ADAF0F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9C00F84A-FCD4-4935-B7DE-ECBA6AE9B074\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"960DC6C2-B285-41D4-96F7-ED97F8BD5482\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*\",\"matchCriteriaId\":\"D1FD0EB4-E744-4465-AFEE-A3C807C9C993\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*\",\"matchCriteriaId\":\"1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*\",\"matchCriteriaId\":\"57772E3B-893C-408A-AA3B-78C972ED4D5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"771931F7-9180-4EBD-8627-E1CF17D24647\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3DB008E3-9A00-4D28-8826-A9FCC9F65314\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EDD9BE2B-7255-4FC1-B452-E8370632B03F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"465B06C4-136D-4CD8-BA38-B6B50511624C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BCB23261-D5A9-4C49-B08E-97A63ED6F84A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17EECCCB-D7D1-439A-9985-8FAE8B44487B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B1F89124-E194-4C7A-B06D-8535B4066AA3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E10D9BF9-FCC7-4680-AD3A-95757FC005EA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*\",\"matchCriteriaId\":\"52F2B17F-A169-402C-AA05-0DE5D805BAD6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"BD44E15F-D216-404F-8585-D278175C2A0F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"78E8C3A4-9FA7-4F2A-8C65-D4404715E674\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7AC78BA4-70F4-4B9F-93C2-B107E4DCC418\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"28A10F5A-067E-4DD8-B585-ABCD6F6B324E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*\",\"matchCriteriaId\":\"9DDC444D-E763-4685-97F8-A027DF6F804D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"249FA642-3732-4654-88CB-3F1D19A5860A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"34EBF074-78C8-41AF-88F1-DA6726E56F8B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"8F1F312C-413F-4DB4-ABF4-48E33F6FECF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"1894C542-AA81-40A9-BF47-AE24C93C1ACB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*\",\"matchCriteriaId\":\"A711CDC2-412C-499D-9FA6-7F25B06267C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*\",\"matchCriteriaId\":\"0B837BB7-5F62-4CD5-9C64-8553C28EA8A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"369207B4-96FA-4324-9445-98FAE8ECF5DB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08003947-A4F1-44AC-84C6-9F8D097EB759\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2475113-CFE4-41C8-A86F-F2DA6548D224\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_advanced_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"69E4BDC1-7750-4B35-88E1-F8449D255114\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"63D8C8D6-8EC1-4B64-996C-636ECD78E7B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2CC0256B-3962-433A-9FAC-37FFAE43E888\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"839D2945-1417-43F5-A526-A14C491CBCEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E06DCF0D-3241-453A-A0E4-937FE25EC404\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D4844D5C-3859-47B1-9A71-CEA2053E2213\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EA8F79B3-2FBD-4CF1-B202-AB302C5F9CC2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9428589A-0BD2-469E-978D-38239117D972\"}]}]}],\"references\":[{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106381604923204\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106382859407683\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.cert.org/advisories/CA-2003-25.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.debian.org/security/2003/dsa-384\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/784980\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:092\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-283.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-284.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.sendmail.org/8.12.10.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2975\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A572\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A603\",\"source\":\"cve@mitre.org\"},{\"url\":\"ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000742\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106381604923204\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106382859407683\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106383437615742\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://marc.info/?l=bugtraq\u0026m=106398718909274\u0026w=2\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.cert.org/advisories/CA-2003-25.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\",\"Third Party Advisory\",\"US Government Resource\"]},{\"url\":\"http://www.debian.org/security/2003/dsa-384\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/784980\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDKSA-2003:092\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-283.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.redhat.com/support/errata/RHSA-2003-284.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.sendmail.org/8.12.10.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2975\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A572\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A603\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}" } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.