cvelist/2010/1xxx/CVE-2010-1132.json

152 lines
5.1 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
2019-03-18 03:03:38 +00:00
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2010-1132",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
2017-10-16 12:31:07 -04:00
]
2019-03-18 03:03:38 +00:00
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The mlfi_envrcpt function in spamass-milter.cpp in SpamAssassin Milter Plugin 0.3.1, when using the expand option, allows remote attackers to execute arbitrary system commands via shell metacharacters in the RCPT TO field of an email message."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "ADV-2010-0559",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0559"
},
{
"name": "20100307 Spamassassin Milter Plugin Remote Root",
"refsource": "FULLDISC",
"url": "http://archives.neohapsis.com/archives/fulldisclosure/2010-03/0139.html"
},
{
"name": "ADV-2010-0683",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0683"
},
{
"name": "39265",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/39265"
},
{
"name": "ADV-2010-0837",
"refsource": "VUPEN",
"url": "http://www.vupen.com/english/advisories/2010/0837"
},
{
"name": "38578",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/38578"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=572117",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=572117"
},
{
"name": "DSA-2021",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2010/dsa-2021"
},
{
"name": "https://savannah.nongnu.org/bugs/?29136",
"refsource": "CONFIRM",
"url": "https://savannah.nongnu.org/bugs/?29136"
},
{
"name": "11662",
"refsource": "EXPLOIT-DB",
"url": "http://www.exploit-db.com/exploits/11662"
},
{
"name": "http://bugs.debian.org/573228",
"refsource": "CONFIRM",
"url": "http://bugs.debian.org/573228"
},
{
"name": "FEDORA-2010-5096",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038535.html"
},
{
"name": "1023691",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1023691"
},
{
"name": "62809",
"refsource": "OSVDB",
"url": "http://osvdb.org/62809"
},
{
"name": "spamassassin-expand-command-execution(56732)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/56732"
},
{
"name": "38956",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38956"
},
{
"name": "38840",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/38840"
},
{
"name": "FEDORA-2010-5112",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038777.html"
},
{
"name": "FEDORA-2010-5176",
"refsource": "FEDORA",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2010-April/038572.html"
}
]
}
}