var-200604-0560
Vulnerability from variot

The Gmax Mail client in Hitachi Groupmax before 20060426 allows remote attackers to cause a denial of service (application hang or erroneous behavior) via an attachment with an MS-DOS device filename. Some email clients contain a vulnerability which may crash themselves as they do not properly handle an attached file with an particular file name.Actual impact could differ depending on the email clients though, email clients may crash when hadling an attached file with a particular file name. Other possible impacts could be an attached file not being saved or hanged up while in the saving process, or an error message being displayed on the application related to the attached file. Groupmax Integrated Desktop is prone to a denial-of-service vulnerability.

TITLE: Groupmax Mail Client Attachment Filename Handling Weakness

SECUNIA ADVISORY ID: SA19840

VERIFY ADVISORY: http://secunia.com/advisories/19840/

CRITICAL: Not critical

IMPACT: DoS

WHERE:

From remote

SOFTWARE: Groupmax World Wide Web Desktop 5.x http://secunia.com/product/4333/ Groupmax World Wide Web 3.x http://secunia.com/product/4332/ Groupmax World Wide Web 2.x http://secunia.com/product/4331/ Groupmax Mail 7.x http://secunia.com/product/6160/ Groupmax Mail 6.x http://secunia.com/product/6159/ Groupmax Integrated Desktop Version 7.x http://secunia.com/product/9565/ Groupmax Integrated Desktop Version 6.x http://secunia.com/product/9564/ Groupmax Integrated Desktop Version 5.x http://secunia.com/product/9563/ Groupmax Integrated Desktop Version 3.x http://secunia.com/product/9562/ Groupmax Integrated Desktop Version 2.x http://secunia.com/product/9561/ Groupmax World Wide Web Desktop 6.x http://secunia.com/product/4334/ Groupmax World Wide Web Desktop for Jichitai 6.x http://secunia.com/product/4335/

DESCRIPTION: A weakness has been reported in Groupmax Mail Client, which potentially can be exploited by malicious people to cause a DoS (Denial of Service).

The weakness is caused due to an error within the handling of email attachments.

The weakness has been reported in the following products: * Groupmax Integrated Desktop version 3, 5, 6, 7. * Mail Client version 02-00 through 02-31-/E. * GroupMail/Client(DOS/V) version 01-21-/C through 01-21-/D. * GroupMail/Client version 01-01 through 01-21-/G. * Groupmax World Wide Web Desktop Version 2, 3, 5, 6.

SOLUTION: Apply patches (see patch matrix in the vendor advisory).

PROVIDED AND/OR DISCOVERED BY: Reported by vendor.

ORIGINAL ADVISORY: http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html


About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.


Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org


Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200604-0560",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "groupmax world wide web",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "groupmax mail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "groupmax world wide web desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "groupmax integrated desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hitachi",
        "version": "*"
      },
      {
        "model": "groupmail/client",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "(dosv) 01-21-/c - 01-21-/d"
      },
      {
        "model": "groupmail/client",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "01-01 - 01-21-/g"
      },
      {
        "model": "groupmax integrated desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "version 2.0 02-10 - 02-31-/s"
      },
      {
        "model": "groupmax integrated desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "version 3 03-00 - 03-10-/p"
      },
      {
        "model": "groupmax integrated desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "version 5 05-00 - 05-11-/h"
      },
      {
        "model": "groupmax integrated desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "version 6 06-00 - 06-52-/c"
      },
      {
        "model": "groupmax integrated desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "version 7 07-00 - 07-20-/c"
      },
      {
        "model": "groupmax world wide web desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "for jichitai 06-51 - 06-52-/a"
      },
      {
        "model": "groupmax world wide web desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "version 2.0"
      },
      {
        "model": "groupmax world wide web desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "version 3"
      },
      {
        "model": "groupmax world wide web desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "version 5"
      },
      {
        "model": "groupmax world wide web desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "version 6 02-00 - 02-31-/i"
      },
      {
        "model": "mail client",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hitachi",
        "version": "02-00 - 02-31-/e"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.6,
        "vendor": "none",
        "version": null
      },
      {
        "model": "groupmax integrated desktop",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax mail",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax world wide web",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax world wide web desktop",
        "scope": null,
        "trust": 0.6,
        "vendor": "hitachi",
        "version": null
      },
      {
        "model": "groupmax world wide web desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "groupmax world wide web",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "groupmax mail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      },
      {
        "model": "groupmax integrated desktop",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hitachi",
        "version": "0"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2773"
      },
      {
        "db": "BID",
        "id": "87657"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000602"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-556"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2087"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:hitachi:groupmail_client",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:hitachi:groupmax_integrated_desktop",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:hitachi:groupmax_world_wide_web_desktop",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:hitachi:mail_client",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000602"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Unknown",
    "sources": [
      {
        "db": "BID",
        "id": "87657"
      }
    ],
    "trust": 0.3
  },
  "cve": "CVE-2006-2087",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CVE-2006-2087",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 1.0,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "IPA",
            "availabilityImpact": "Partial",
            "baseScore": 5.0,
            "confidentialityImpact": "None",
            "exploitabilityScore": null,
            "id": "JVNDB-2006-000602",
            "impactScore": null,
            "integrityImpact": "None",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "Medium",
            "trust": 0.8,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "CNVD",
            "availabilityImpact": "PARTIAL",
            "baseScore": 5.0,
            "confidentialityImpact": "NONE",
            "exploitabilityScore": 10.0,
            "id": "CNVD-2006-2773",
            "impactScore": 2.9,
            "integrityImpact": "NONE",
            "severity": "MEDIUM",
            "trust": 0.6,
            "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2006-2087",
            "trust": 1.0,
            "value": "MEDIUM"
          },
          {
            "author": "IPA",
            "id": "JVNDB-2006-000602",
            "trust": 0.8,
            "value": "Medium"
          },
          {
            "author": "CNVD",
            "id": "CNVD-2006-2773",
            "trust": 0.6,
            "value": "MEDIUM"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200604-556",
            "trust": 0.6,
            "value": "MEDIUM"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2773"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000602"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-556"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2087"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The Gmax Mail client in Hitachi Groupmax before 20060426 allows remote attackers to cause a denial of service (application hang or erroneous behavior) via an attachment with an MS-DOS device filename. Some email clients contain a vulnerability which may crash themselves as they do not properly handle an attached file with an particular file name.Actual impact could differ depending on the email clients though, email clients may crash when hadling an attached file with a particular file name. Other possible impacts could be an attached file not being saved or hanged up while in the saving process, or an error message being displayed on the application related to the attached file. Groupmax Integrated Desktop is prone to a denial-of-service vulnerability. \n\nTITLE:\nGroupmax Mail Client Attachment Filename Handling Weakness\n\nSECUNIA ADVISORY ID:\nSA19840\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/19840/\n\nCRITICAL:\nNot critical\n\nIMPACT:\nDoS\n\nWHERE:\n\u003eFrom remote\n\nSOFTWARE:\nGroupmax World Wide Web Desktop 5.x\nhttp://secunia.com/product/4333/\nGroupmax World Wide Web 3.x\nhttp://secunia.com/product/4332/\nGroupmax World Wide Web 2.x\nhttp://secunia.com/product/4331/\nGroupmax Mail 7.x\nhttp://secunia.com/product/6160/\nGroupmax Mail 6.x\nhttp://secunia.com/product/6159/\nGroupmax Integrated Desktop Version 7.x\nhttp://secunia.com/product/9565/\nGroupmax Integrated Desktop Version 6.x\nhttp://secunia.com/product/9564/\nGroupmax Integrated Desktop Version 5.x\nhttp://secunia.com/product/9563/\nGroupmax Integrated Desktop Version 3.x\nhttp://secunia.com/product/9562/\nGroupmax Integrated Desktop Version 2.x\nhttp://secunia.com/product/9561/\nGroupmax World Wide Web Desktop 6.x\nhttp://secunia.com/product/4334/\nGroupmax World Wide Web Desktop for Jichitai 6.x\nhttp://secunia.com/product/4335/\n\nDESCRIPTION:\nA weakness has been reported in Groupmax Mail Client, which\npotentially can be exploited by malicious people to cause a DoS\n(Denial of Service). \n\nThe weakness is caused due to an error within the handling of email\nattachments. \n\nThe weakness has been reported in the following products:\n* Groupmax Integrated Desktop version 3, 5, 6, 7. \n* Mail Client version 02-00 through 02-31-/E. \n* GroupMail/Client(DOS/V) version 01-21-/C  through 01-21-/D. \n* GroupMail/Client version 01-01 through 01-21-/G. \n* Groupmax World Wide Web Desktop Version 2, 3, 5, 6. \n\nSOLUTION:\nApply patches (see patch matrix in the vendor advisory). \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by vendor. \n\nORIGINAL ADVISORY:\nhttp://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/index-e.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-2087"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000602"
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-2773"
      },
      {
        "db": "BID",
        "id": "87657"
      },
      {
        "db": "PACKETSTORM",
        "id": "45729"
      }
    ],
    "trust": 2.52
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "NVD",
        "id": "CVE-2006-2087",
        "trust": 3.3
      },
      {
        "db": "SECUNIA",
        "id": "19840",
        "trust": 3.2
      },
      {
        "db": "OSVDB",
        "id": "24969",
        "trust": 2.4
      },
      {
        "db": "HITACHI",
        "id": "HS06-006",
        "trust": 2.0
      },
      {
        "db": "XF",
        "id": "26099",
        "trust": 1.7
      },
      {
        "db": "VUPEN",
        "id": "ADV-2006-1539",
        "trust": 1.6
      },
      {
        "db": "JVN",
        "id": "JVN89344424",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000602",
        "trust": 0.8
      },
      {
        "db": "CNVD",
        "id": "CNVD-2006-2773",
        "trust": 0.6
      },
      {
        "db": "JVN",
        "id": "JVN#89344424",
        "trust": 0.6
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-556",
        "trust": 0.6
      },
      {
        "db": "BID",
        "id": "87657",
        "trust": 0.3
      },
      {
        "db": "PACKETSTORM",
        "id": "45729",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2773"
      },
      {
        "db": "BID",
        "id": "87657"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000602"
      },
      {
        "db": "PACKETSTORM",
        "id": "45729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-556"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2087"
      }
    ]
  },
  "id": "VAR-200604-0560",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2773"
      }
    ],
    "trust": 1.1833333000000001
  },
  "iot_taxonomy": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot_taxonomy#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "category": [
          "ICS"
        ],
        "sub_category": null,
        "trust": 0.6
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2773"
      }
    ]
  },
  "last_update_date": "2024-11-23T22:32:28.375000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HS06-006",
        "trust": 0.8,
        "url": "http://www.hitachi-support.com/security_e/vuls_e/HS06-006_e/01-e.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000602"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2006-2087"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://secunia.com/advisories/19840"
      },
      {
        "trust": 2.4,
        "url": "http://www.osvdb.org/24969"
      },
      {
        "trust": 2.0,
        "url": "http://www.hitachi-support.com/security_e/vuls_e/hs06-006_e/index-e.html"
      },
      {
        "trust": 1.9,
        "url": "http://jvn.jp/jp/jvn%2389344424/index.html"
      },
      {
        "trust": 1.9,
        "url": "http://www.hitachi-support.com/security_e/vuls_e/hs06-006_e/01-e.html"
      },
      {
        "trust": 1.7,
        "url": "http://xforce.iss.net/xforce/xfdb/26099"
      },
      {
        "trust": 1.4,
        "url": "http://www.frsirt.com/english/advisories/2006/1539"
      },
      {
        "trust": 1.0,
        "url": "http://www.vupen.com/english/advisories/2006/1539"
      },
      {
        "trust": 1.0,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26099"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2006-2087"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/en/jp/jvn89344424/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2006-2087"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9561/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/advisories/19840/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4333/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9564/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4335/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/secunia_security_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9565/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4334/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9563/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4331/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6160/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/6159/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/about_secunia_advisories/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/9562/"
      },
      {
        "trust": 0.1,
        "url": "http://secunia.com/product/4332/"
      }
    ],
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2773"
      },
      {
        "db": "BID",
        "id": "87657"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000602"
      },
      {
        "db": "PACKETSTORM",
        "id": "45729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-556"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2087"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2773"
      },
      {
        "db": "BID",
        "id": "87657"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2006-000602"
      },
      {
        "db": "PACKETSTORM",
        "id": "45729"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-556"
      },
      {
        "db": "NVD",
        "id": "CVE-2006-2087"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-04-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-2773"
      },
      {
        "date": "2006-04-29T00:00:00",
        "db": "BID",
        "id": "87657"
      },
      {
        "date": "2008-05-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000602"
      },
      {
        "date": "2006-04-27T21:57:26",
        "db": "PACKETSTORM",
        "id": "45729"
      },
      {
        "date": "2006-04-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200604-556"
      },
      {
        "date": "2006-04-29T10:02:00",
        "db": "NVD",
        "id": "CVE-2006-2087"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2006-04-29T00:00:00",
        "db": "CNVD",
        "id": "CNVD-2006-2773"
      },
      {
        "date": "2006-04-29T00:00:00",
        "db": "BID",
        "id": "87657"
      },
      {
        "date": "2008-05-21T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2006-000602"
      },
      {
        "date": "2006-04-30T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200604-556"
      },
      {
        "date": "2024-11-21T00:10:31.590000",
        "db": "NVD",
        "id": "CVE-2006-2087"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-556"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Gmax Mail client in Hitachi Groupmax Denial of Service Vulnerability",
    "sources": [
      {
        "db": "CNVD",
        "id": "CNVD-2006-2773"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-556"
      }
    ],
    "trust": 1.2
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "unknown",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200604-556"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Published Proof of Concept: A public proof of concept is available for this vulnerability.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.


Loading…

Loading…