cvelist/2009/2xxx/CVE-2009-2632.json

168 lines
5.6 KiB
JSON

{
"CVE_data_meta" : {
"ASSIGNER" : "cve@mitre.org",
"ID" : "CVE-2009-2632",
"STATE" : "PUBLIC"
},
"affects" : {
"vendor" : {
"vendor_data" : [
{
"product" : {
"product_data" : [
{
"product_name" : "n/a",
"version" : {
"version_data" : [
{
"version_value" : "n/a"
}
]
}
}
]
},
"vendor_name" : "n/a"
}
]
}
},
"data_format" : "MITRE",
"data_type" : "CVE",
"data_version" : "4.0",
"description" : {
"description_data" : [
{
"lang" : "eng",
"value" : "Buffer overflow in the SIEVE script component (sieve/script.c), as used in cyrus-imapd in Cyrus IMAP Server 2.2.13 and 2.3.14, and Dovecot 1.0 before 1.0.4 and 1.1 before 1.1.7, allows local users to execute arbitrary code and read or modify arbitrary messages via a crafted SIEVE script, related to the incorrect use of the sizeof operator for determining buffer length, combined with an integer signedness error."
}
]
},
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng",
"value" : "n/a"
}
]
}
]
},
"references" : {
"reference_data" : [
{
"name" : "[Cyrus-CVS] 20090902 src/sieve by brong",
"refsource" : "MLIST",
"url" : "https://lists.andrew.cmu.edu/pipermail/cyrus-cvs/2009-September/001253.html"
},
{
"name" : "[Cyrus-CVS] 20090902 src/sieve by brong",
"refsource" : "MLIST",
"url" : "https://lists.andrew.cmu.edu/pipermail/cyrus-cvs/2009-September/001254.html"
},
{
"name" : "[Dovecot-news] 20090914 Security holes in CMU Sieve plugin",
"refsource" : "MLIST",
"url" : "http://dovecot.org/list/dovecot-news/2009-September/000135.html"
},
{
"name" : "[oss-security] 20090914 Re: CVE for recent cyrus-imap issue",
"refsource" : "MLIST",
"url" : "http://www.openwall.com/lists/oss-security/2009/09/14/3"
},
{
"name" : "https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sieve/script.c.diff?r1=1.62&r2=1.62.2.1&only_with_tag=cyrus-imapd-2_2-tail",
"refsource" : "CONFIRM",
"url" : "https://bugzilla.andrew.cmu.edu/cgi-bin/cvsweb.cgi/src/sieve/script.c.diff?r1=1.62&r2=1.62.2.1&only_with_tag=cyrus-imapd-2_2-tail"
},
{
"name" : "http://support.apple.com/kb/HT4077",
"refsource" : "CONFIRM",
"url" : "http://support.apple.com/kb/HT4077"
},
{
"name" : "APPLE-SA-2010-03-29-1",
"refsource" : "APPLE",
"url" : "http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html"
},
{
"name" : "DSA-1881",
"refsource" : "DEBIAN",
"url" : "http://www.debian.org/security/2009/dsa-1881"
},
{
"name" : "FEDORA-2009-9559",
"refsource" : "FEDORA",
"url" : "https://www.redhat.com/archives/fedora-package-announce/2009-September/msg00491.html"
},
{
"name" : "SUSE-SR:2009:016",
"refsource" : "SUSE",
"url" : "http://lists.opensuse.org/opensuse-security-announce/2009-10/msg00001.html"
},
{
"name" : "USN-838-1",
"refsource" : "UBUNTU",
"url" : "http://www.ubuntu.com/usn/USN-838-1"
},
{
"name" : "36296",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/36296"
},
{
"name" : "36377",
"refsource" : "BID",
"url" : "http://www.securityfocus.com/bid/36377"
},
{
"name" : "58103",
"refsource" : "OSVDB",
"url" : "http://www.osvdb.org/58103"
},
{
"name" : "oval:org.mitre.oval:def:10082",
"refsource" : "OVAL",
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10082"
},
{
"name" : "36629",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36629"
},
{
"name" : "36632",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36632"
},
{
"name" : "36698",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36698"
},
{
"name" : "36713",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36713"
},
{
"name" : "36904",
"refsource" : "SECUNIA",
"url" : "http://secunia.com/advisories/36904"
},
{
"name" : "ADV-2009-2559",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/2559"
},
{
"name" : "ADV-2009-2641",
"refsource" : "VUPEN",
"url" : "http://www.vupen.com/english/advisories/2009/2641"
}
]
}
}