2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2004-1098" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2005-01-10T05:00:00.000" ,
2025-04-03 02:06:18 +00:00
"lastModified" : "2025-04-03T01:03:51.193" ,
"vulnStatus" : "Deferred" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "MIMEDefang in MIME-tools 5.414 allows remote attackers to bypass virus scanning capabilities via an e-mail attachment with a virus that contains an empty boundary string in the Content-Type header."
} ,
{
"lang" : "es" ,
"value" : "MIMEDefang de MIME-tools 5.414 permite a atacantes remotos sortear escaner de virus mediante adjuntos en correo electr\u00f3nico con virus que contengan una cadena de l\u00edmite vacia en la cabecera Content-Type."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:P/I:P/A:P" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 7.5 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "PARTIAL" ,
"integrityImpact" : "PARTIAL" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "PARTIAL"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 6.4 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : false ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : true ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
"value" : "NVD-CWE-Other"
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:2.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "00487C1B-E557-46AA-863D-6B27E06402C4"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:2.14:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E49F4116-2497-4AC4-ACE2-E77F3C1889EE"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:2.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0AA989CD-020D-487B-9E83-2316185C6950"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:2.21:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EAF67BB2-1984-4C6A-90DA-75C14CF7B7DB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:2.38:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "925509AA-CFCA-4200-BA7B-168D94CD498F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:2.39:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E2579A91-66A4-49F6-893E-3F228F9AF868"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:2.41:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "D81EF517-56CD-4A76-9212-A08D3176B191"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:2.42:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "236D9552-6FD5-4093-B8A3-843A074D2C30"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:2.43:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "35222B53-7F83-4CCD-BEE3-2A040008BE00"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:2.44:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "10289D13-ADD9-4529-85F1-20DCC1964557"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:2.45:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3F42F5D5-4DDF-4EFA-9ACD-D1B7D5E0AE66"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:4.46:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "75E0113A-A862-4E10-AB2E-F24DC7F7F018"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:a:roaring_penguin:mimedefang:4.47:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4191CD9F-FF03-4203-8387-167BA208CCDF"
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4177C378-7729-46AB-B49B-C6DAED3200E7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux:9.2:*:amd64:*:*:*:*:*" ,
"matchCriteriaId" : "2164D10D-D1A4-418A-A9C8-CA8FAB1E90A7"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A06E5CD0-8BEC-4F4C-9E11-1FEE0563946C"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux:10.0:*:amd64:*:*:*:*:*" ,
"matchCriteriaId" : "A3BDD466-84C9-4CFC-A3A8-7AC0F752FB53"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3528DABD-B821-4D23-AE12-614A9CA92C46"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux:10.1:*:x86_64:*:*:*:*:*" ,
"matchCriteriaId" : "9E661D58-18DF-4CCF-9892-F873618F4535"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E0F0D201-B1DC-4024-AF77-A284673618F3"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:x86_64:*:*:*:*:*" ,
"matchCriteriaId" : "052E3862-BFB7-42E7-889D-8590AFA8EF37"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:8.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "28CD54FE-D682-4063-B7C3-8B29B26B39AD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:8.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "F8C55338-3372-413F-82E3-E1B476D6F41A"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:8.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "1EFB33BF-F6A5-48C1-AEB5-194FCBCFC958"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:9.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "FB0E2D3B-B50A-46C2-BA1E-3E014DE91954"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:9.0:*:x86_64:*:*:*:*:*" ,
"matchCriteriaId" : "56EF103F-5668-4754-A83B-D3662D0CE815"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:9.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFABFCE5-4F86-4AE8-9849-BC360AC72098"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:suse:suse_linux:9.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "CFF36BC6-6CCD-4FEE-A120-5B8C4BF5620C"
}
]
}
]
}
] ,
"references" : [
{
"url" : "http://lists.roaringpenguin.com/pipermail/mimedefang/2004-October/024959.html" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200411-06.xml" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:123" ,
"source" : "cve@mitre.org"
} ,
{
"url" : "http://www.securityfocus.com/bid/11563" ,
"source" : "cve@mitre.org" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17940" ,
"source" : "cve@mitre.org"
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "http://lists.roaringpenguin.com/pipermail/mimedefang/2004-October/024959.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.gentoo.org/security/en/glsa/glsa-200411-06.xml" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.mandriva.com/security/advisories?name=MDKSA-2004:123" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
} ,
{
"url" : "http://www.securityfocus.com/bid/11563" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://exchange.xforce.ibmcloud.com/vulnerabilities/17940" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108"
2023-04-24 12:24:31 +02:00
}
]
}