2023-04-24 12:24:31 +02:00
{
"id" : "CVE-2002-1337" ,
"sourceIdentifier" : "cve@mitre.org" ,
"published" : "2003-03-07T05:00:00.000" ,
2025-04-03 02:06:18 +00:00
"lastModified" : "2025-04-03T01:03:51.193" ,
"vulnStatus" : "Deferred" ,
2024-07-14 02:06:08 +00:00
"cveTags" : [ ] ,
2023-04-24 12:24:31 +02:00
"descriptions" : [
{
"lang" : "en" ,
"value" : "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c."
} ,
{
"lang" : "es" ,
"value" : "Desbordamiento de b\u00fafer en Sendmail 5.79 a la 8.12.7 que permite a atacantes remotos la ejecuci\u00f3n arbitraria de c\u00f3digo mediante ciertos campos de direcci\u00f3n formateados, relativos a comentarios de cabecera de emisor y receptor, procesados por la funci\u00f3n crackaddr del fichero headers.c."
}
] ,
"metrics" : {
"cvssMetricV2" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"cvssData" : {
"version" : "2.0" ,
"vectorString" : "AV:N/AC:L/Au:N/C:C/I:C/A:C" ,
2024-12-08 03:06:42 +00:00
"baseScore" : 10.0 ,
2023-04-24 12:24:31 +02:00
"accessVector" : "NETWORK" ,
"accessComplexity" : "LOW" ,
"authentication" : "NONE" ,
"confidentialityImpact" : "COMPLETE" ,
"integrityImpact" : "COMPLETE" ,
2024-12-08 03:06:42 +00:00
"availabilityImpact" : "COMPLETE"
2023-04-24 12:24:31 +02:00
} ,
"baseSeverity" : "HIGH" ,
"exploitabilityScore" : 10.0 ,
"impactScore" : 10.0 ,
"acInsufInfo" : false ,
"obtainAllPrivilege" : true ,
"obtainUserPrivilege" : false ,
"obtainOtherPrivilege" : false ,
"userInteractionRequired" : false
}
]
} ,
"weaknesses" : [
{
"source" : "nvd@nist.gov" ,
"type" : "Primary" ,
"description" : [
{
"lang" : "en" ,
2024-02-09 05:00:29 +00:00
"value" : "CWE-120"
2023-04-24 12:24:31 +02:00
}
]
}
] ,
"configurations" : [
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
{
"vulnerable" : true ,
2024-02-09 05:00:29 +00:00
"criteria" : "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*" ,
"versionEndExcluding" : "8.9.3" ,
"matchCriteriaId" : "C6D3A2C0-B076-4351-8085-DA3A37117453"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-02-09 05:00:29 +00:00
"criteria" : "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.10.0" ,
"versionEndExcluding" : "8.11.6" ,
"matchCriteriaId" : "5AE239ED-94EE-40C7-9133-D1F4779A2E0C"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-02-09 05:00:29 +00:00
"criteria" : "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*" ,
"versionStartIncluding" : "8.12.0" ,
"versionEndExcluding" : "8.12.8" ,
"matchCriteriaId" : "64788C22-64F9-41DB-A4C2-BFCD6DBD8EE6"
2023-04-24 12:24:31 +02:00
}
]
}
]
} ,
{
"nodes" : [
{
"operator" : "OR" ,
"negate" : false ,
"cpeMatch" : [
2024-02-09 05:00:29 +00:00
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "5556D665-3792-4832-9EEE-D1122C9BF98E"
} ,
2023-04-24 12:24:31 +02:00
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*" ,
"matchCriteriaId" : "D1FD0EB4-E744-4465-AFEE-A3C807C9C993"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*" ,
"matchCriteriaId" : "1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "38BFA923-7D80-4F01-AF9F-6F13209948AC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EDE44C49-172C-4899-8CC8-29AA99A7CD2F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "771931F7-9180-4EBD-8627-E1CF17D24647"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "3DB008E3-9A00-4D28-8826-A9FCC9F65314"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EDD9BE2B-7255-4FC1-B452-E8370632B03F"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "E10D9BF9-FCC7-4680-AD3A-95757FC005EA"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "78E8C3A4-9FA7-4F2A-8C65-D4404715E674"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "28A10F5A-067E-4DD8-B585-ABCD6F6B324E"
} ,
{
"vulnerable" : true ,
2024-02-09 05:00:29 +00:00
"criteria" : "cpe:2.3:o:oracle:solaris:2.6:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "69C7B4A8-E8D0-425C-B979-17E85458B0C6"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-02-09 05:00:29 +00:00
"criteria" : "cpe:2.3:o:oracle:solaris:7.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "0F538D2B-1AE1-4766-830E-CF7999181128"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-02-09 05:00:29 +00:00
"criteria" : "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "722A52CF-4C6E-44D3-90C4-D2F72A40EF58"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
2024-02-09 05:00:29 +00:00
"criteria" : "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "4F864AD7-53A2-4225-870F-062876CE45DD"
2023-04-24 12:24:31 +02:00
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "369207B4-96FA-4324-9445-98FAE8ECF5DB"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "08003947-A4F1-44AC-84C6-9F8D097EB759"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "A2475113-CFE4-41C8-A86F-F2DA6548D224"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:windriver:bsdos:4.2:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "18B197B3-AA07-440F-A733-80B7CE07B3D2"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:windriver:bsdos:4.3.1:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "42761237-75A9-4E8C-8202-3CA3EB3D1ACC"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:windriver:bsdos:5.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "7FAFD2BC-330C-4357-B8C7-F451C6282869"
} ,
{
"vulnerable" : true ,
"criteria" : "cpe:2.3:o:windriver:platform_sa:1.0:*:*:*:*:*:*:*" ,
"matchCriteriaId" : "2151D858-F6D4-472E-9CC7-A8EA26E27CC7"
}
]
}
]
}
] ,
"references" : [
{
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=104673778105192&w=2" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=104678739608479&w=2" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=104678862109841&w=2" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=104678862409849&w=2" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=104679411316818&w=2" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Third Party Advisory"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40500&apar=only" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40501&apar=only" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40502&apar=only" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.cert.org/advisories/CA-2003-07.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
2024-02-09 05:00:29 +00:00
"Broken Link" ,
2023-04-24 12:24:31 +02:00
"Patch" ,
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "http://www.debian.org/security/2003/dsa-257" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950" ,
"source" : "cve@mitre.org" ,
"tags" : [
2024-02-09 05:00:29 +00:00
"Broken Link" ,
2023-04-24 12:24:31 +02:00
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.iss.net/security_center/static/10748.php" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/398025" ,
"source" : "cve@mitre.org" ,
"tags" : [
2024-02-09 05:00:29 +00:00
"Third Party Advisory" ,
2023-04-24 12:24:31 +02:00
"US Government Resource"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2003-073.html" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2003-074.html" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2003-227.html" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
} ,
{
"url" : "http://www.securityfocus.com/bid/6991" ,
"source" : "cve@mitre.org" ,
"tags" : [
2024-02-09 05:00:29 +00:00
"Broken Link" ,
2023-04-24 12:24:31 +02:00
"Exploit" ,
"Patch" ,
2024-02-09 05:00:29 +00:00
"Third Party Advisory" ,
"VDB Entry" ,
2023-04-24 12:24:31 +02:00
"Vendor Advisory"
]
} ,
{
"url" : "http://www.sendmail.org/8.12.8.html" ,
"source" : "cve@mitre.org" ,
"tags" : [
2024-02-09 05:00:29 +00:00
"Broken Link" ,
2023-04-24 12:24:31 +02:00
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222" ,
2024-02-09 05:00:29 +00:00
"source" : "cve@mitre.org" ,
"tags" : [
"Broken Link"
]
2024-12-08 03:06:42 +00:00
} ,
{
"url" : "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=104673778105192&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=104678739608479&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=104678862109841&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=104678862409849&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://marc.info/?l=bugtraq&m=104679411316818&w=2" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory"
]
} ,
{
"url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40500&apar=only" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40501&apar=only" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40502&apar=only" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.cert.org/advisories/CA-2003-07.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Patch" ,
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "http://www.debian.org/security/2003/dsa-257" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.iss.net/security_center/static/10748.php" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.kb.cert.org/vuls/id/398025" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Third Party Advisory" ,
"US Government Resource"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2003-073.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2003-074.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.redhat.com/support/errata/RHSA-2003-227.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
} ,
{
"url" : "http://www.securityfocus.com/bid/6991" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Exploit" ,
"Patch" ,
"Third Party Advisory" ,
"VDB Entry" ,
"Vendor Advisory"
]
} ,
{
"url" : "http://www.sendmail.org/8.12.8.html" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link" ,
"Patch" ,
"Vendor Advisory"
]
} ,
{
"url" : "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222" ,
"source" : "af854a3a-2127-422b-91ae-364da2661108" ,
"tags" : [
"Broken Link"
]
2023-04-24 12:24:31 +02:00
}
]
}