All the vulnerabilites related to JustSystems Corporation - Shuriken
jvndb-2004-000592
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2008-05-21 00:00
Severity ?
() - -
Summary
Shuriken Pro3 S/MIME signature verification does not verify the certificate authenticity
Details
Shuriken Pro3 contains a vulnerability in the S/MIME signature verification where the authenticity of the certificate is not verified when verifying the S/MIME digital signature of an email message.
References
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2004/JVNDB-2004-000592.html",
  "dc:date": "2008-05-21T00:00+09:00",
  "dcterms:issued": "2008-05-21T00:00+09:00",
  "dcterms:modified": "2008-05-21T00:00+09:00",
  "description": "Shuriken Pro3 contains a vulnerability in the S/MIME signature verification where the authenticity of the certificate is not verified when verifying the S/MIME digital signature of an email message.",
  "link": "https://jvndb.jvn.jp/en/contents/2004/JVNDB-2004-000592.html",
  "sec:cpe": {
    "#text": "cpe:/a:justsystems:shuriken",
    "@product": "Shuriken",
    "@vendor": "JustSystems Corporation",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2004-000592",
  "sec:references": {
    "#text": "http://jvn.jp/en/jp/JVNB4BE09A4/index.html",
    "@id": "JVN#B4BE09A4",
    "@source": "JVN"
  },
  "title": "Shuriken Pro3 S/MIME signature verification does not verify the certificate authenticity"
}

jvndb-2004-000591
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2008-05-21 00:00
Severity ?
() - -
Summary
Shuriken Pro3 S/MIME signature verification does not verify the From address
Details
Shuriken Pro3 contains a vulnerability in the S/MIME signature verification where the From address is not verified properly.
References
Impacted products
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2004/JVNDB-2004-000591.html",
  "dc:date": "2008-05-21T00:00+09:00",
  "dcterms:issued": "2008-05-21T00:00+09:00",
  "dcterms:modified": "2008-05-21T00:00+09:00",
  "description": "Shuriken Pro3 contains a vulnerability in the S/MIME signature verification where the From address is not verified properly.",
  "link": "https://jvndb.jvn.jp/en/contents/2004/JVNDB-2004-000591.html",
  "sec:cpe": {
    "#text": "cpe:/a:justsystems:shuriken",
    "@product": "Shuriken",
    "@vendor": "JustSystems Corporation",
    "@version": "2.2"
  },
  "sec:cvss": {
    "@score": "5.0",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:L/Au:N/C:N/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2004-000591",
  "sec:references": {
    "#text": "http://jvn.jp/en/jp/JVNB410A83F/index.html",
    "@id": "JVN#B410A83F",
    "@source": "JVN"
  },
  "title": "Shuriken Pro3 S/MIME signature verification does not verify the From address"
}

jvndb-2005-000772
Vulnerability from jvndb
Published
2008-05-21 00:00
Modified
2008-05-21 00:00
Severity ?
() - -
Summary
Inappropriate interpretation of mailto URL scheme by mail client software
Details
The mailto URL scheme is used to designate the Internet email address on a web page. Specifying an email address and body text using the mailto URL scheme gives a template for a mail message. Many mail clients have a function to set a field specified by the mailto URL scheme in a mail header. RFC2368 defining the mailto URL scheme points out the followings in its Security Considerations section. - A mail client should never send anything without complete disclosure to the user of the full message created based on descriptions of the mailto URL scheme - It should explicitly display any headers along with the message destination. - It is inappropriate to set a header related to mail delivery based on descriptions of the mailto URL scheme However, some mail clients set the header related to mail delivery based on descriptions of the mailto URL scheme or do not explicitly display the full header. We published this issue on JVN in coordination with developers, to publicize the issue to users and mail client developers.
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2005/JVNDB-2005-000772.html",
  "dc:date": "2008-05-21T00:00+09:00",
  "dcterms:issued": "2008-05-21T00:00+09:00",
  "dcterms:modified": "2008-05-21T00:00+09:00",
  "description": "The mailto URL scheme is used to designate the Internet email address on a web page. Specifying an email address and body text using the mailto URL scheme gives a template for a mail message. Many mail clients have a function to set a field specified by the mailto URL scheme in a mail header.\r\n\r\nRFC2368 defining the mailto URL scheme points out the followings in its Security Considerations section.\r\n\r\n- A mail client should never send anything without complete disclosure to the user of the full message created based on descriptions of the mailto URL scheme\r\n- It should explicitly display any headers along with the message destination.\r\n- It is inappropriate to set a header related to mail delivery based on descriptions of the mailto URL scheme  \r\n\r\nHowever, some mail clients set the header related to mail delivery based on descriptions of the mailto URL scheme or do not explicitly display the full header.\r\n\r\nWe published this issue on JVN in coordination with developers, to publicize the issue to users and mail client developers.",
  "link": "https://jvndb.jvn.jp/en/contents/2005/JVNDB-2005-000772.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:allied_telesis_k.k.:at-mail_server",
      "@product": "AT-Mail Server",
      "@vendor": "Allied Telesis",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:hidemaru:hidemaru_mail",
      "@product": "Hidemaru Mail",
      "@vendor": "Saitoh Kikaku",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:shuriken",
      "@product": "Shuriken",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:misc:edcom_edmax",
      "@product": "EdMax",
      "@vendor": "Edcom Inc. ",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:misc:edcom_edmax_free",
      "@product": "EdMax Free",
      "@vendor": "Edcom Inc. ",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:misc:orange_winbiff",
      "@product": "Winbiff",
      "@vendor": "Orangesoft Inc.",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:rimarts_inc.:becky_internet_mail",
      "@product": "Becky! Internet Mail",
      "@vendor": "RIMARTS",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "4.3",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2005-000772",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVNFCAD9BD8/index.html",
      "@id": "JVN#FCAD9BD8",
      "@source": "JVN"
    },
    {
      "#text": "http://www.ietf.org/rfc/rfc2368.txt",
      "@id": "RFC2368: The mailto URL scheme",
      "@source": "IETF"
    }
  ],
  "title": "Inappropriate interpretation of mailto URL scheme by mail client software"
}

jvndb-2012-000035
Vulnerability from jvndb
Published
2012-04-24 13:37
Modified
2012-05-09 19:49
Severity ?
() - -
Summary
Multiple JustSystems products vulnerable to buffer overflow
Details
Multiple products provided by JustSystems Corporation contain a buffer overflow vulnerability. Multiple products provided by JustSystems Corporation contain a buffer overflow vulnerability due to improper handling of image files. Tielei Wang of Georgia Tech Information Security Center reported this vulnerability to JPCERT/CC via The Secunia Vulnerability Coordination Reward Programme (SVCRP). JPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.
Show details on JVN DB website


{
  "@rdf:about": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000035.html",
  "dc:date": "2012-05-09T19:49+09:00",
  "dcterms:issued": "2012-04-24T13:37+09:00",
  "dcterms:modified": "2012-05-09T19:49+09:00",
  "description": "Multiple products provided by JustSystems Corporation contain a buffer overflow vulnerability.\r\n\r\nMultiple products provided by JustSystems Corporation contain a buffer overflow vulnerability due to improper handling of image files.\r\n\r\nTielei Wang of Georgia Tech Information Security Center reported this vulnerability to JPCERT/CC via The Secunia Vulnerability Coordination Reward Programme (SVCRP).\r\nJPCERT/CC coordinated with the developer under Information Security Early Warning Partnership.",
  "link": "https://jvndb.jvn.jp/en/contents/2012/JVNDB-2012-000035.html",
  "sec:cpe": [
    {
      "#text": "cpe:/a:justsystems:ichitaro",
      "@product": "Ichitaro",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:ichitaro_government",
      "@product": "Ichitaro Government",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:ichitaro_portable",
      "@product": "Ichitaro Portable",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:ichitaro_viewer",
      "@product": "Ichitaro Viewer",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:justschool",
      "@product": "Just School",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_frontier",
      "@product": "Just Frontier",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:just_jump",
      "@product": "Just Jump",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:rekishimail",
      "@product": "Rekishimail",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/a:justsystems:shuriken",
      "@product": "Shuriken",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    },
    {
      "#text": "cpe:/h:justsystems:oreplug",
      "@product": "oreplug",
      "@vendor": "JustSystems Corporation",
      "@version": "2.2"
    }
  ],
  "sec:cvss": {
    "@score": "6.8",
    "@severity": "Medium",
    "@type": "Base",
    "@vector": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
    "@version": "2.0"
  },
  "sec:identifier": "JVNDB-2012-000035",
  "sec:references": [
    {
      "#text": "http://jvn.jp/en/jp/JVN09619876/index.html",
      "@id": "JVN#09619876",
      "@source": "JVN"
    },
    {
      "#text": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2012-0269",
      "@id": "CVE-2012-0269",
      "@source": "CVE"
    },
    {
      "#text": "http://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2012-0269",
      "@id": "CVE-2012-0269",
      "@source": "NVD"
    },
    {
      "#text": "http://www.ipa.go.jp/security/english/vuln/201205_justsystem_en.html",
      "@id": "Security Alert for Vulnerability in Multiple JustSystems Products",
      "@source": "IPA SECURITY ALERTS"
    },
    {
      "#text": "http://secunia.com/advisories/47363/",
      "@id": "SA47363 JustSystems Multiple Products Two Vulnerabilities",
      "@source": "SECUNIA"
    },
    {
      "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
      "@id": "CWE-189",
      "@title": "Numeric Errors(CWE-189)"
    }
  ],
  "title": "Multiple JustSystems products vulnerable to buffer overflow"
}