mirror of
https://github.com/fkie-cad/nvd-json-data-feeds.git
synced 2025-05-28 01:02:25 +00:00
601 lines
22 KiB
JSON
601 lines
22 KiB
JSON
{
|
|
"id": "CVE-2002-1337",
|
|
"sourceIdentifier": "cve@mitre.org",
|
|
"published": "2003-03-07T05:00:00.000",
|
|
"lastModified": "2018-10-30T16:26:22.763",
|
|
"vulnStatus": "Modified",
|
|
"descriptions": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c."
|
|
},
|
|
{
|
|
"lang": "es",
|
|
"value": "Desbordamiento de b\u00fafer en Sendmail 5.79 a la 8.12.7 que permite a atacantes remotos la ejecuci\u00f3n arbitraria de c\u00f3digo mediante ciertos campos de direcci\u00f3n formateados, relativos a comentarios de cabecera de emisor y receptor, procesados por la funci\u00f3n crackaddr del fichero headers.c."
|
|
}
|
|
],
|
|
"metrics": {
|
|
"cvssMetricV2": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"cvssData": {
|
|
"version": "2.0",
|
|
"vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
|
|
"accessVector": "NETWORK",
|
|
"accessComplexity": "LOW",
|
|
"authentication": "NONE",
|
|
"confidentialityImpact": "COMPLETE",
|
|
"integrityImpact": "COMPLETE",
|
|
"availabilityImpact": "COMPLETE",
|
|
"baseScore": 10.0
|
|
},
|
|
"baseSeverity": "HIGH",
|
|
"exploitabilityScore": 10.0,
|
|
"impactScore": 10.0,
|
|
"acInsufInfo": false,
|
|
"obtainAllPrivilege": true,
|
|
"obtainUserPrivilege": false,
|
|
"obtainOtherPrivilege": false,
|
|
"userInteractionRequired": false
|
|
}
|
|
]
|
|
},
|
|
"weaknesses": [
|
|
{
|
|
"source": "nvd@nist.gov",
|
|
"type": "Primary",
|
|
"description": [
|
|
{
|
|
"lang": "en",
|
|
"value": "NVD-CWE-Other"
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"configurations": [
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "FABD33DF-FEC4-4519-B2ED-4E498A7329FB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2455BE6E-7540-4545-B40A-0366BDA6AE7E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:2.6:*:nt:*:*:*:*:*",
|
|
"matchCriteriaId": "3300A5FC-69D9-4F19-AB0E-0273F5ECF45C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:2.6.1:*:nt:*:*:*:*:*",
|
|
"matchCriteriaId": "EC340D43-0E4D-4365-A604-9DDF3BD62039"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:3.0:*:nt:*:*:*:*:*",
|
|
"matchCriteriaId": "E43CBCA0-47B1-4992-A636-A0BF4441B91A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:3.0.1:*:nt:*:*:*:*:*",
|
|
"matchCriteriaId": "2FA4711B-319B-4410-A1B5-C6D8C4B1EC68"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:3.0.2:*:nt:*:*:*:*:*",
|
|
"matchCriteriaId": "F4981D22-AA6B-4901-95BA-F1BB893828B0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5DFC5B8B-9102-46A9-9BD3-5CC0B671383F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "51BC02ED-17B1-44B3-97DB-F626A2BD2524"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EF58EBCB-5735-4569-957D-C37CC38F0823"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D30A1136-074A-460D-9794-DDD530626800"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76A9602B-8E5A-4BF4-81F5-D1152D09FCAD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EFD0B100-D822-4EBF-8EC9-ADAB8141116B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "196D77DF-E6D4-46D0-BC2C-8804A587CA25"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B743E5A3-6B15-4877-9424-A1F1A4214B73"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "76A60742-7815-4658-A6F7-147AA48C24B6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9A1A24F2-9C6B-4DF0-AB04-55D051812DD1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "120271B8-08A9-4C21-A108-0DA61095A006"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "84E6ECDA-DF65-47FF-A42F-FD5C1D864FA3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7AA859AF-4E4E-4077-8E98-523E617A1DDC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A9791650-C367-43B6-A0F4-5BB56CE10778"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8340DDA8-77DD-4AEB-B267-F86F64A851B3"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "07DCBBEE-1DF0-40FE-B755-1FC35CF16788"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "581626E7-47B5-4819-B34F-B6DFD07A12F9"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8BBE9A4A-8AB9-4A97-A106-970FEB08952C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*",
|
|
"matchCriteriaId": "BD99394C-5408-4A01-8D4E-417FFFFDE9C7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*",
|
|
"matchCriteriaId": "AAB59A24-87DE-4CAD-A2BA-AFCC0B2A55B2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*",
|
|
"matchCriteriaId": "97D641EF-0B69-45A1-B85E-3C9C93AB9D42"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8972211B-6A5B-4095-9CBB-CEF4C23C9C65"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8F81A2AD-90A0-4B97-86A3-92690A0FCA71"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "598F74BA-2B71-435E-92B8-9DEADB3311A5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "79A46DF2-8EEB-40C8-B1CA-01BC064BD25E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "581E5904-1A2B-49FF-BE3F-D42019AD816B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B6CC4C83-4FB9-4344-AFCB-C260659F81DD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "CAF763B4-58E3-4868-8C92-47DE3E4E5F40"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "6FEB3923-8F4B-4523-84F9-17D1CFA37F8C"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "58CD19B4-4BFD-4DE8-B21F-6B6CDE6793C5"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5492A89B-8140-4CF7-BE81-09C25A64373A"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "B2A6D5AF-2134-4EC5-B53A-CE95B5505325"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1B5FE819-E570-4AEE-BF0C-B9B1960A1AB8"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "913AF73A-F6DE-4FAF-8A09-02CD33784B27"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "661A9B85-09EE-4D38-9160-8EEA6BE07BD7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DD930C49-512B-4114-8A97-80B1816CFCFA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7E8553E3-578B-4BE3-BBAD-5589338586E6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7EE5C8E-8E2E-4C98-B8C5-B590E44B1EAC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2A3930ED-DE49-4F01-A904-5D66E34832F4"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A3A51855-94DD-4F2E-BFF8-4ABE4613F962"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "74C77927-A67A-4C1B-BB80-18148E1F0FE0"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "9C9D22E3-18F8-42F9-993E-81E832B0B125"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7BABB5CA-26F4-4DB6-9D43-1C82751DCCA1"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:a:sgi:freeware:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E7970668-A80C-461D-A779-A8A6880D319B"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",
|
|
"matchCriteriaId": "D1FD0EB4-E744-4465-AFEE-A3C807C9C993"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*",
|
|
"matchCriteriaId": "1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "3DB008E3-9A00-4D28-8826-A9FCC9F65314"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "28A10F5A-067E-4DD8-B585-ABCD6F6B324E"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
|
|
"matchCriteriaId": "8F1F312C-413F-4DB4-ABF4-48E33F6FECF2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
|
|
"matchCriteriaId": "1894C542-AA81-40A9-BF47-AE24C93C1ACB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
|
|
"matchCriteriaId": "A711CDC2-412C-499D-9FA6-7F25B06267C6"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
|
|
"matchCriteriaId": "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:windriver:bsdos:4.2:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "18B197B3-AA07-440F-A733-80B7CE07B3D2"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:windriver:bsdos:4.3.1:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "42761237-75A9-4E8C-8202-3CA3EB3D1ACC"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:windriver:bsdos:5.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "7FAFD2BC-330C-4357-B8C7-F451C6282869"
|
|
},
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:o:windriver:platform_sa:1.0:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "2151D858-F6D4-472E-9CC7-A8EA26E27CC7"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
{
|
|
"nodes": [
|
|
{
|
|
"operator": "OR",
|
|
"negate": false,
|
|
"cpeMatch": [
|
|
{
|
|
"vulnerable": true,
|
|
"criteria": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",
|
|
"matchCriteriaId": "5556D665-3792-4832-9EEE-D1122C9BF98E"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
}
|
|
],
|
|
"references": [
|
|
{
|
|
"url": "ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=104673778105192&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=104678739608479&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=104678862109841&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=104678862409849&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://marc.info/?l=bugtraq&m=104679411316818&w=2",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40500&apar=only",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40501&apar=only",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www-1.ibm.com/support/search.wss?rs=0&q=IY40502&apar=only",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.cert.org/advisories/CA-2003-07.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Third Party Advisory",
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.debian.org/security/2003/dsa-257",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.iss.net/security_center/static/10748.php",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.kb.cert.org/vuls/id/398025",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"US Government Resource"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-073.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-074.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.redhat.com/support/errata/RHSA-2003-227.html",
|
|
"source": "cve@mitre.org"
|
|
},
|
|
{
|
|
"url": "http://www.securityfocus.com/bid/6991",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Exploit",
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "http://www.sendmail.org/8.12.8.html",
|
|
"source": "cve@mitre.org",
|
|
"tags": [
|
|
"Patch",
|
|
"Vendor Advisory"
|
|
]
|
|
},
|
|
{
|
|
"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222",
|
|
"source": "cve@mitre.org"
|
|
}
|
|
]
|
|
} |