{ "id": "CVE-2006-1173", "sourceIdentifier": "cret@cert.org", "published": "2006-06-07T23:06:00.000", "lastModified": "2024-11-21T00:08:14.503", "vulnStatus": "Modified", "cveTags": [], "descriptions": [ { "lang": "en", "value": "Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files." } ], "metrics": { "cvssMetricV2": [ { "source": "nvd@nist.gov", "type": "Primary", "cvssData": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "baseScore": 5.0, "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "NONE", "integrityImpact": "NONE", "availabilityImpact": "PARTIAL" }, "baseSeverity": "MEDIUM", "exploitabilityScore": 10.0, "impactScore": 2.9, "acInsufInfo": false, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } ] }, "weaknesses": [ { "source": "nvd@nist.gov", "type": "Primary", "description": [ { "lang": "en", "value": "CWE-399" } ] } ], "configurations": [ { "nodes": [ { "operator": "OR", "negate": false, "cpeMatch": [ { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", "versionEndIncluding": "8.13.6", "matchCriteriaId": "8D42D00B-42EC-4AEC-98FE-6B321206E121" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*", "matchCriteriaId": "D30A1136-074A-460D-9794-DDD530626800" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*", "matchCriteriaId": "76A9602B-8E5A-4BF4-81F5-D1152D09FCAD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*", "matchCriteriaId": "EFD0B100-D822-4EBF-8EC9-ADAB8141116B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*", "matchCriteriaId": "196D77DF-E6D4-46D0-BC2C-8804A587CA25" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*", "matchCriteriaId": "B743E5A3-6B15-4877-9424-A1F1A4214B73" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*", "matchCriteriaId": "76A60742-7815-4658-A6F7-147AA48C24B6" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*", "matchCriteriaId": "9A1A24F2-9C6B-4DF0-AB04-55D051812DD1" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*", "matchCriteriaId": "120271B8-08A9-4C21-A108-0DA61095A006" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*", "matchCriteriaId": "84E6ECDA-DF65-47FF-A42F-FD5C1D864FA3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*", "matchCriteriaId": "7AA859AF-4E4E-4077-8E98-523E617A1DDC" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*", "matchCriteriaId": "A9791650-C367-43B6-A0F4-5BB56CE10778" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*", "matchCriteriaId": "8340DDA8-77DD-4AEB-B267-F86F64A851B3" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*", "matchCriteriaId": "07DCBBEE-1DF0-40FE-B755-1FC35CF16788" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*", "matchCriteriaId": "581626E7-47B5-4819-B34F-B6DFD07A12F9" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*", "matchCriteriaId": "8BBE9A4A-8AB9-4A97-A106-970FEB08952C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:*", "matchCriteriaId": "B754AD41-90A0-4382-B599-E41289C690A2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*", "matchCriteriaId": "BD99394C-5408-4A01-8D4E-417FFFFDE9C7" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*", "matchCriteriaId": "AAB59A24-87DE-4CAD-A2BA-AFCC0B2A55B2" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*", "matchCriteriaId": "97D641EF-0B69-45A1-B85E-3C9C93AB9D42" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*", "matchCriteriaId": "8972211B-6A5B-4095-9CBB-CEF4C23C9C65" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*", "matchCriteriaId": "8F81A2AD-90A0-4B97-86A3-92690A0FCA71" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*", "matchCriteriaId": "598F74BA-2B71-435E-92B8-9DEADB3311A5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*", "matchCriteriaId": "79A46DF2-8EEB-40C8-B1CA-01BC064BD25E" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*", "matchCriteriaId": "581E5904-1A2B-49FF-BE3F-D42019AD816B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*", "matchCriteriaId": "B6CC4C83-4FB9-4344-AFCB-C260659F81DD" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*", "matchCriteriaId": "CAF763B4-58E3-4868-8C92-47DE3E4E5F40" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*", "matchCriteriaId": "8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*", "matchCriteriaId": "6FEB3923-8F4B-4523-84F9-17D1CFA37F8C" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*", "matchCriteriaId": "58CD19B4-4BFD-4DE8-B21F-6B6CDE6793C5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*", "matchCriteriaId": "7B82BBB7-CD72-4A33-97D4-B1E51A595323" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*", "matchCriteriaId": "6C1D6A40-5DD1-481C-AF85-85705FCE3680" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:*", "matchCriteriaId": "DC7125C4-64AF-4A3B-BBD6-1A56660A2D90" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:*", "matchCriteriaId": "83AE5BA5-09FF-4AF8-B4E8-4D372A208E2B" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.0:*:*:*:*:*:*:*", "matchCriteriaId": "B4E0D099-C149-4923-A06C-200A23CEA943" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.1:*:*:*:*:*:*:*", "matchCriteriaId": "01B75BCD-9187-4DB0-903D-5F73429AEE78" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "631A40C3-4266-4516-A586-8341D2C01270" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.2:*:*:*:*:*:*:*", "matchCriteriaId": "F7DB5E2A-0E79-45DF-BD85-FD216A970771" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:*", "matchCriteriaId": "D20FAC60-445E-4847-B5DE-8ACDDA55E1CA" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:*", "matchCriteriaId": "9962F81C-A08C-4F8E-A07C-4F4B5C441EA5" }, { "vulnerable": true, "criteria": "cpe:2.3:a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:*", "matchCriteriaId": "A38C234D-EF75-4A96-A0FD-E1DDDADAC1BC" } ] } ] } ], "references": [ { "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc", "source": "cret@cert.org" }, { "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P", "source": "cret@cert.org" }, { "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc", "source": "cret@cert.org" }, { "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635", "source": "cret@cert.org" }, { "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635", "source": "cret@cert.org" }, { "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html", "source": "cret@cert.org" }, { "url": "http://secunia.com/advisories/15779", "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20473", "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20641", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20650", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20651", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20654", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20673", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20675", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20679", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20683", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20684", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20694", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20726", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20782", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21042", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21160", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21327", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21612", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21647", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1016295", "source": "cret@cert.org" }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.631382", "source": "cret@cert.org" }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1", "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm", "source": "cret@cert.org" }, { "url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY85415&apar=only", "source": "cret@cert.org" }, { "url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY85930&apar=only", "source": "cret@cert.org" }, { "url": "http://www.debian.org/security/2006/dsa-1155", "source": "cret@cert.org" }, { "url": "http://www.f-secure.com/security/fsc-2006-5.shtml", "source": "cret@cert.org" }, { "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html", "source": "cret@cert.org" }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml", "source": "cret@cert.org" }, { "url": "http://www.kb.cert.org/vuls/id/146718", "source": "cret@cert.org", "tags": [ "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104", "source": "cret@cert.org" }, { "url": "http://www.openbsd.org/errata38.html#sendmail2", "source": "cret@cert.org" }, { "url": "http://www.osvdb.org/26197", "source": "cret@cert.org" }, { "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html", "source": "cret@cert.org" }, { "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded", "source": "cret@cert.org" }, { "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded", "source": "cret@cert.org" }, { "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded", "source": "cret@cert.org" }, { "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded", "source": "cret@cert.org" }, { "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded", "source": "cret@cert.org" }, { "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded", "source": "cret@cert.org" }, { "url": "http://www.securityfocus.com/bid/18433", "source": "cret@cert.org", "tags": [ "Patch" ] }, { "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc", "source": "cret@cert.org", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2006/2189", "source": "cret@cert.org" }, { "url": "http://www.vupen.com/english/advisories/2006/2351", "source": "cret@cert.org" }, { "url": "http://www.vupen.com/english/advisories/2006/2388", "source": "cret@cert.org" }, { "url": "http://www.vupen.com/english/advisories/2006/2389", "source": "cret@cert.org", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2006/2390", "source": "cret@cert.org" }, { "url": "http://www.vupen.com/english/advisories/2006/2798", "source": "cret@cert.org" }, { "url": "http://www.vupen.com/english/advisories/2006/3135", "source": "cret@cert.org" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128", "source": "cret@cert.org" }, { "url": "https://issues.rpath.com/browse/RPL-526", "source": "cret@cert.org" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253", "source": "cret@cert.org" }, { "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://secunia.com/advisories/15779", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20473", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20641", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20650", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20651", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20654", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20673", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20675", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20679", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20683", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20684", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20694", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20726", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/20782", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21042", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21160", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21327", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21612", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://secunia.com/advisories/21647", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://securitytracker.com/id?1016295", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.631382", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY85415&apar=only", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY85930&apar=only", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.debian.org/security/2006/dsa-1155", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.f-secure.com/security/fsc-2006-5.shtml", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.kb.cert.org/vuls/id/146718", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory", "US Government Resource" ] }, { "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2006:104", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.openbsd.org/errata38.html#sendmail2", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.osvdb.org/26197", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.redhat.com/support/errata/RHSA-2006-0515.html", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/437928/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/438241/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/438330/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/440744/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/archive/1/442939/100/0/threaded", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.securityfocus.com/bid/18433", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch" ] }, { "url": "http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Patch", "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2006/2189", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.vupen.com/english/advisories/2006/2351", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.vupen.com/english/advisories/2006/2388", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.vupen.com/english/advisories/2006/2389", "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.vupen.com/english/advisories/2006/2390", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.vupen.com/english/advisories/2006/2798", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "http://www.vupen.com/english/advisories/2006/3135", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/27128", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://issues.rpath.com/browse/RPL-526", "source": "af854a3a-2127-422b-91ae-364da2661108" }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253", "source": "af854a3a-2127-422b-91ae-364da2661108" } ] }