cvelist/2009/1xxx/CVE-2009-1636.json

138 lines
4.6 KiB
JSON
Raw Normal View History

2017-10-16 12:31:07 -04:00
{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2009-1636",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Multiple buffer overflows in the Internet Agent (aka GWIA) component in Novell GroupWise 7.x before 7.03 HP3 and 8.x before 8.0 HP2 allow remote attackers to execute arbitrary code via (1) a crafted e-mail address in an SMTP session or (2) an SMTP command."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "20090522 Novell GroupWise Internet Agent Remote Buffer Overflow Vulnerabilities",
"refsource" : "BUGTRAQ",
2018-10-10 15:05:20 -04:00
"url" : "http://www.securityfocus.com/archive/1/503724/100/0/threaded"
2017-10-16 12:31:07 -04:00
},
{
"name" : "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_Email_Address_Remote_Buffer_Overflow_Exploit_1393141.php",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_Email_Address_Remote_Buffer_Overflow_Exploit_1393141.php"
},
{
"name" : "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_SMTP_Command_Remote_Buffer_Overflow_PoC_Exploit_1393140.php",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/exploits/Novell_GroupWise_GWIA_SMTP_Command_Remote_Buffer_Overflow_PoC_Exploit_1393140.php"
},
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=478892",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=478892"
},
{
"name" : "https://bugzilla.novell.com/show_bug.cgi?id=482914",
"refsource" : "MISC",
2017-10-16 12:31:07 -04:00
"url" : "https://bugzilla.novell.com/show_bug.cgi?id=482914"
},
{
"name" : "http://www.novell.com/support/viewContent.do?externalId=7003272&sliceId=1",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://www.novell.com/support/viewContent.do?externalId=7003272&sliceId=1"
},
{
"name" : "http://www.novell.com/support/viewContent.do?externalId=7003273&sliceId=1",
"refsource" : "CONFIRM",
2017-10-16 12:31:07 -04:00
"url" : "http://www.novell.com/support/viewContent.do?externalId=7003273&sliceId=1"
},
{
"name" : "35064",
"refsource" : "BID",
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/35064"
},
{
"name" : "35065",
"refsource" : "BID",
2017-10-16 12:31:07 -04:00
"url" : "http://www.securityfocus.com/bid/35065"
},
{
"name" : "54644",
"refsource" : "OSVDB",
2017-10-16 12:31:07 -04:00
"url" : "http://osvdb.org/54644"
},
{
"name" : "54645",
"refsource" : "OSVDB",
2017-10-16 12:31:07 -04:00
"url" : "http://osvdb.org/54645"
},
{
"name" : "1022276",
"refsource" : "SECTRACK",
2017-10-16 12:31:07 -04:00
"url" : "http://www.securitytracker.com/id?1022276"
},
{
"name" : "35177",
"refsource" : "SECUNIA",
2017-10-16 12:31:07 -04:00
"url" : "http://secunia.com/advisories/35177"
},
{
"name" : "ADV-2009-1393",
"refsource" : "VUPEN",
2017-10-16 12:31:07 -04:00
"url" : "http://www.vupen.com/english/advisories/2009/1393"
},
{
"name" : "gia-email-code-execution(50693)",
"refsource" : "XF",
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50693"
},
{
"name" : "gia-smtp-code-execution(50692)",
"refsource" : "XF",
2017-10-16 12:31:07 -04:00
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/50692"
}
]
}
}