Vulnerabilites related to FUJITSU - SystemWalker IT BudgetMGR
var-200912-0451
Vulnerability from variot

Fujitsu Interstage and Systemwalker related products have the vulnerabilities listed below: - A buffer overflow vulnerability that can occur when the SSL server verifies the client's certificate. - A vulnerability that makes it possible to make an SSL connection using a server or client certificate issued by the old CA certificate after the CA certificate is renewed, regardless of the settings of the certificate environment variables. - A vulnerability where the depletion of resources, such as file descriptors, can occur on the SSL server.A remote attacker can cause a denial of service (DoS) condition or make an SSL connection using a fake certificate. ----------------------------------------------------------------------

Do you have VARM strategy implemented?

(Vulnerability Assessment Remediation Management)

If not, then implement it through the most reliable vulnerability intelligence source on the market.

Implement it through Secunia.

For more information visit: http://secunia.com/advisories/business_solutions/

Alternatively request a call from a Secunia representative today to discuss how we can help you with our capabilities contact us at: sales@secunia.com

TITLE: Fujitsu Products SSL Implementation Multiple Vulnerabilities

SECUNIA ADVISORY ID: SA37989

VERIFY ADVISORY: http://secunia.com/advisories/37989/

DESCRIPTION: Some vulnerabilities have been reported in multiple Fujitsu products, which can be exploited by malicious people to bypass certain security restrictions or cause a DoS (Denial of Service).

3) An error in the implementation of the SSL server can be exploited to exhaust e.g. available file descriptors.

Please see the vendor's advisory for a full list of affected products.

SOLUTION: Apply patches. Please see the vendor's advisory for details.

PROVIDED AND/OR DISCOVERED BY: Reported by the vendor.

ORIGINAL ADVISORY: Fujitsu: http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_systemwalker_ssl_200901.html

OTHER REFERENCES: JVN: http://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-002358.html

About: This Advisory was delivered by Secunia as a free service to help everybody keeping their systems up to date against the latest vulnerabilities.

Subscribe: http://secunia.com/advisories/secunia_security_advisories/

Definitions: (Criticality, Where etc.) http://secunia.com/advisories/about_secunia_advisories/

Please Note: Secunia recommends that you verify all advisories you receive by clicking the link. Secunia NEVER sends attached files with advisories. Secunia does not advise people to install third party patches, only use those supplied by the vendor.

Unsubscribe: Secunia Security Advisories http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200912-0451",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "infodirectory",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "infoprovider pro",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "infoproxy",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "infoproxy for middleware",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "interstage",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "interstage apcoordinator",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "interstage application framework suite",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "interstage application server",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "interstage apworks",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "interstage business application manager",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "interstage form coordinator syomei option",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "interstage security director",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "interstage traffic director",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "linkexpress",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "safeauthor",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "safegate",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "safegate client",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "safegate syutyu kanri",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "symfoware universal data interchanger",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "systemwalker centric manager",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "systemwalker centricmgr-a",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "systemwalker desktop inspection",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "systemwalker desktop patrol",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "systemwalker formcoordinator syomei option",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "systemwalker it budget manager",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "systemwalker it budgetmgr",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "systemwalker software delivery",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "systemwalker/infodirectory",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "trademaster",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "trmaster",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-002358",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  cpe_match: [
                     {
                        cpe22Uri: "cpe:/a:fujitsu:infodirectory",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:infoprovider_pro",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:infoproxy",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:infoproxy_for_middleware",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:interstage",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:interstage_apcoordinator",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:interstage_application_framework_suite",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:interstage_application_server",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:interstage_apworks",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:interstage_business_application_manager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:interstage_form_coordinator_syomei_option",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:interstage_security_director",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:interstage_traffic_director",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:linkexpress",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:safeauthor",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:safegate",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:safegate_client",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:safegate_syutyu_kanri",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:symfoware_universal_data_interchanger",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:systemwalker_centric_manager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:systemwalker_centricmgr-a",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:systemwalker_desktop_inspection",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:systemwalker_desktop_patrol",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:systemwalker_formcoordinator_syomei_option",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:systemwalker_it_budget_manager",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:systemwalker_it_budgetmgr",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:systemwalker_software_delivery",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:systemwalker_infodirectory",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:trademaster",
                        vulnerable: true,
                     },
                     {
                        cpe22Uri: "cpe:/a:fujitsu:trmaster",
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-002358",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Secunia",
      sources: [
         {
            db: "PACKETSTORM",
            id: "84267",
         },
      ],
      trust: 0.1,
   },
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "IPA",
                  availabilityImpact: "Partial",
                  baseScore: 5,
                  confidentialityImpact: "None",
                  exploitabilityScore: null,
                  id: "JVNDB-2009-002358",
                  impactScore: null,
                  integrityImpact: "None",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "Medium",
                  trust: 0.8,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:N/I:N/A:P",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "IPA",
                  id: "JVNDB-2009-002358",
                  trust: 0.8,
                  value: "Medium",
               },
            ],
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-002358",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Fujitsu Interstage and Systemwalker related products have the vulnerabilities listed below: - A buffer overflow vulnerability that can occur when the SSL server verifies the client's certificate. - A vulnerability that makes it possible to make an SSL connection using a server or client certificate issued by the old CA certificate after the CA certificate is renewed, regardless of the settings of the certificate environment variables. - A vulnerability where the depletion of resources, such as file descriptors, can occur on the SSL server.A remote attacker can cause a denial of service (DoS) condition or make an SSL connection using a fake certificate. ----------------------------------------------------------------------\n\nDo you have VARM strategy implemented?\n\n(Vulnerability Assessment Remediation Management)  \n\nIf not, then implement it through the most reliable vulnerability\nintelligence source on the market. \n\nImplement it through Secunia. \n\nFor more information visit:\nhttp://secunia.com/advisories/business_solutions/\n\nAlternatively request a call from a Secunia representative today to\ndiscuss how we can help you with our capabilities contact us at:\nsales@secunia.com\n\n----------------------------------------------------------------------\n\nTITLE:\nFujitsu Products SSL Implementation Multiple Vulnerabilities\n\nSECUNIA ADVISORY ID:\nSA37989\n\nVERIFY ADVISORY:\nhttp://secunia.com/advisories/37989/\n\nDESCRIPTION:\nSome vulnerabilities have been reported in multiple Fujitsu products,\nwhich can be exploited by malicious people to bypass certain security\nrestrictions or cause a DoS (Denial of Service). \n\n3) An error in the implementation of the SSL server can be exploited\nto exhaust e.g. available file descriptors. \n\nPlease see the vendor's advisory for a full list of affected\nproducts. \n\nSOLUTION:\nApply patches. Please see the vendor's advisory for details. \n\nPROVIDED AND/OR DISCOVERED BY:\nReported by the vendor. \n\nORIGINAL ADVISORY:\nFujitsu:\nhttp://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_systemwalker_ssl_200901.html\n\nOTHER REFERENCES:\nJVN:\nhttp://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-002358.html\n\n----------------------------------------------------------------------\n\nAbout:\nThis Advisory was delivered by Secunia as a free service to help\neverybody keeping their systems up to date against the latest\nvulnerabilities. \n\nSubscribe:\nhttp://secunia.com/advisories/secunia_security_advisories/\n\nDefinitions: (Criticality, Where etc.)\nhttp://secunia.com/advisories/about_secunia_advisories/\n\n\nPlease Note:\nSecunia recommends that you verify all advisories you receive by\nclicking the link. \nSecunia NEVER sends attached files with advisories. \nSecunia does not advise people to install third party patches, only\nuse those supplied by the vendor. \n\n----------------------------------------------------------------------\n\nUnsubscribe: Secunia Security Advisories\nhttp://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org\n\n----------------------------------------------------------------------\n\n\n",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-002358",
         },
         {
            db: "PACKETSTORM",
            id: "84267",
         },
      ],
      trust: 0.81,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-002358",
            trust: 0.9,
         },
         {
            db: "SECUNIA",
            id: "37989",
            trust: 0.2,
         },
         {
            db: "PACKETSTORM",
            id: "84267",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-002358",
         },
         {
            db: "PACKETSTORM",
            id: "84267",
         },
      ],
   },
   id: "VAR-200912-0451",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VARIoT devices database",
            id: null,
         },
      ],
      trust: 0.1875,
   },
   last_update_date: "2022-05-17T22:49:29.265000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "interstage_systemwalker_ssl_200901",
            trust: 0.8,
            url: "http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_systemwalker_ssl_200901.html",
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-002358",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "CWE-119",
            trust: 0.8,
         },
         {
            problemtype: "CWE-399",
            trust: 0.8,
         },
         {
            problemtype: "CWE-287",
            trust: 0.8,
         },
      ],
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-002358",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/37989/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/secunia_security_advisories/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/business_solutions/",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/sec_adv_unsubscribe/?email=packet%40packetstormsecurity.org",
         },
         {
            trust: 0.1,
            url: "http://jvndb.jvn.jp/en/contents/2009/jvndb-2009-002358.html",
         },
         {
            trust: 0.1,
            url: "http://software.fujitsu.com/jp/security/products-fujitsu/solution/interstage_systemwalker_ssl_200901.html",
         },
         {
            trust: 0.1,
            url: "http://secunia.com/advisories/about_secunia_advisories/",
         },
      ],
      sources: [
         {
            db: "PACKETSTORM",
            id: "84267",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-002358",
         },
         {
            db: "PACKETSTORM",
            id: "84267",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2009-12-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2009-002358",
         },
         {
            date: "2009-12-29T10:25:23",
            db: "PACKETSTORM",
            id: "84267",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2009-12-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2009-002358",
         },
      ],
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Fujitsu Interstage and Systemwalker SSL Vulnerabilities",
      sources: [
         {
            db: "JVNDB",
            id: "JVNDB-2009-002358",
         },
      ],
      trust: 0.8,
   },
}

var-200310-0072
Vulnerability from variot

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. sendmail A buffer overflow vulnerability was discovered in the email address parsing process. This vulnerability CERT Advisory CA-2003-07, CA-2003-12 This is a new vulnerability that differs from the vulnerability reported in. As for the vulnerability, there is a possibility that a third party may obtain administrator authority from a remote location. This problem, sendmail Occurs by receiving a message with a maliciously configured email address. For this reason, LAN Is running on a host sendmail Even other MTA (Mail Transfer Agent) If you receive a malicious message relayed from, you may be affected by the vulnerability.Service operation interruption (denial-of-service, DoS) An attacker or a remote third party may gain administrative privileges. This issue is different than the vulnerability described in BID 7230. Sendmail is one of the most popular mail transfer agents (MTAs) on the Internet. The local exploitation method on Linux can use recipient.c and sendtolist() to overwrite the pointer with the data submitted by the user. When calling the free() function, the command may be redirected, and the attacker can construct a malicious email message and submit it to Sendmail for analysis. Execute arbitrary commands on the system with Sendmail process privileges. There may also be other exploit methods, and it is also possible to exploit this vulnerability remotely

Show details on source website


{
   "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
      affected_products: {
         "@id": "https://www.variotdbs.pl/ref/affected_products",
      },
      configurations: {
         "@id": "https://www.variotdbs.pl/ref/configurations",
      },
      credits: {
         "@id": "https://www.variotdbs.pl/ref/credits",
      },
      cvss: {
         "@id": "https://www.variotdbs.pl/ref/cvss/",
      },
      description: {
         "@id": "https://www.variotdbs.pl/ref/description/",
      },
      exploit_availability: {
         "@id": "https://www.variotdbs.pl/ref/exploit_availability/",
      },
      external_ids: {
         "@id": "https://www.variotdbs.pl/ref/external_ids/",
      },
      iot: {
         "@id": "https://www.variotdbs.pl/ref/iot/",
      },
      iot_taxonomy: {
         "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/",
      },
      patch: {
         "@id": "https://www.variotdbs.pl/ref/patch/",
      },
      problemtype_data: {
         "@id": "https://www.variotdbs.pl/ref/problemtype_data/",
      },
      references: {
         "@id": "https://www.variotdbs.pl/ref/references/",
      },
      sources: {
         "@id": "https://www.variotdbs.pl/ref/sources/",
      },
      sources_release_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_release_date/",
      },
      sources_update_date: {
         "@id": "https://www.variotdbs.pl/ref/sources_update_date/",
      },
      threat_type: {
         "@id": "https://www.variotdbs.pl/ref/threat_type/",
      },
      title: {
         "@id": "https://www.variotdbs.pl/ref/title/",
      },
      type: {
         "@id": "https://www.variotdbs.pl/ref/type/",
      },
   },
   "@id": "https://www.variotdbs.pl/vuln/VAR-200310-0072",
   affected_products: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            model: "netbsd",
            scope: "eq",
            trust: 2.1,
            vendor: "netbsd",
            version: "1.6.1",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 2.1,
            vendor: "netbsd",
            version: "1.6",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 2.1,
            vendor: "netbsd",
            version: "1.5.3",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 2.1,
            vendor: "netbsd",
            version: "1.5.2",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 2.1,
            vendor: "netbsd",
            version: "1.5.1",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 2.1,
            vendor: "netbsd",
            version: "1.5",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 2.1,
            vendor: "ibm",
            version: "5.2",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 2.1,
            vendor: "ibm",
            version: "5.1",
         },
         {
            model: "workstation",
            scope: "eq",
            trust: 1.9,
            vendor: "turbolinux",
            version: "8.0",
         },
         {
            model: "workstation",
            scope: "eq",
            trust: 1.9,
            vendor: "turbolinux",
            version: "7.0",
         },
         {
            model: "workstation",
            scope: "eq",
            trust: 1.9,
            vendor: "turbolinux",
            version: "6.0",
         },
         {
            model: "server",
            scope: "eq",
            trust: 1.9,
            vendor: "turbolinux",
            version: "8.0",
         },
         {
            model: "server",
            scope: "eq",
            trust: 1.9,
            vendor: "turbolinux",
            version: "7.0",
         },
         {
            model: "server",
            scope: "eq",
            trust: 1.9,
            vendor: "turbolinux",
            version: "6.5",
         },
         {
            model: "server",
            scope: "eq",
            trust: 1.9,
            vendor: "turbolinux",
            version: "6.1",
         },
         {
            model: "advanced server",
            scope: "eq",
            trust: 1.9,
            vendor: "turbolinux",
            version: "6.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.8,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.8,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1.8,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 1.3,
            vendor: "sun",
            version: "7.0",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 1.3,
            vendor: "sun",
            version: "2.6",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1.3,
            vendor: "sgi",
            version: "6.5.16",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1.3,
            vendor: "sgi",
            version: "6.5.15",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 1.3,
            vendor: "netbsd",
            version: "1.4.3",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 1.3,
            vendor: "ibm",
            version: "4.3.3",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 1.3,
            vendor: "hp",
            version: "11.22",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 1.3,
            vendor: "hp",
            version: "11.11",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1.3,
            vendor: "gentoo",
            version: "1.2",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1.3,
            vendor: "gentoo",
            version: "0.7",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1.3,
            vendor: "gentoo",
            version: "0.5",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.2.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1a_pk5_bl23",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.11.1",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1a_pk3_bl3",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 1,
            vendor: "hp",
            version: "11.0.4",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.9.3",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.3",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.3",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "4.0f_pk6_bl17",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "3.0.2",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1a_pk2_bl2",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.6.1",
         },
         {
            model: "sunos",
            scope: "eq",
            trust: 1,
            vendor: "sun",
            version: null,
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "4.0g_pk4_bl22",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "3.0",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "3.0",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1b_pk2_bl22",
         },
         {
            model: "advanced message server",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "1.2",
         },
         {
            model: "pro",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.9.3",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1_pk5_bl19",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "4.0f_pk7_bl18",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.6",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "4.0f",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.10.1",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1_pk4_bl18",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 1,
            vendor: "hp",
            version: "11.00",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "4.0f_pk8_bl22",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1b_pk1_bl1",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1,
            vendor: "sgi",
            version: "6.5.19m",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1,
            vendor: "sgi",
            version: "6.5.18f",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.2.2",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.2.3",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.4",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.11.3",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.12.8",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.1.3",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1,
            vendor: "sgi",
            version: "6.5.18m",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1,
            vendor: "sgi",
            version: "6.5.17m",
         },
         {
            model: "sunos",
            scope: "eq",
            trust: 1,
            vendor: "sun",
            version: "5.8",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 1,
            vendor: "sun",
            version: "9.0",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.12.4",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "4.0g_pk3_bl17",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.2.5",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "gentoo",
            version: "1.1a",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "3.0.3",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 1,
            vendor: "sun",
            version: "8.0",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "3.0.3",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.1.4",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.11.5",
         },
         {
            model: "advanced message server",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "1.3",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1,
            vendor: "sgi",
            version: "6.5.17f",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.1.1",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "3.0.1",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1,
            vendor: "sgi",
            version: "6.5.19f",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.12.2",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.11.6",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "3.0.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.6",
         },
         {
            model: "sunos",
            scope: "eq",
            trust: 1,
            vendor: "sun",
            version: "5.7",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.10.2",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.12.3",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1a_pk1_bl1",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.1",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.1",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 1,
            vendor: "gentoo",
            version: "1.4",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.2.4",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.9.0",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "4.0g",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.12",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.9.1",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1b",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "3.0.2",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.2",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.2",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.8.8",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.9.2",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.12.6",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1a_pk4_bl21",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1_pk6_bl20",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.11.0",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.4",
         },
         {
            model: "pro",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.9.2",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.12.0",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.2",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1,
            vendor: "sgi",
            version: "6.5.21f",
         },
         {
            model: "mac os x",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.5",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.12.5",
         },
         {
            model: "mac os x server",
            scope: "eq",
            trust: 1,
            vendor: "apple",
            version: "10.2.5",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.12.1",
         },
         {
            model: "freebsd",
            scope: "eq",
            trust: 1,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.11.2",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.1.5",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1_pk3_bl17",
         },
         {
            model: "tru64",
            scope: "eq",
            trust: 1,
            vendor: "compaq",
            version: "5.1a",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.12.9",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.6.2",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.1.2",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "2.1",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1,
            vendor: "sgi",
            version: "6.5.21m",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1,
            vendor: "sgi",
            version: "6.5.20f",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 1,
            vendor: "sgi",
            version: "6.5.20m",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.11.4",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.12.7",
         },
         {
            model: "sendmail",
            scope: "eq",
            trust: 1,
            vendor: "sendmail",
            version: "8.10",
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "apple computer",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "conectiva",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "debian",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "freebsd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "gentoo linux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "hewlett packard",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ibm",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "ibm eserver",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "mandrakesoft",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "netbsd",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "openpkg",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "red hat",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sgi",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "secure computing",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sendmail",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "slackware",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "suse",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "sun microsystems",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "the sendmail consortium",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "turbolinux",
            version: null,
         },
         {
            model: null,
            scope: null,
            trust: 0.8,
            vendor: "wirex",
            version: null,
         },
         {
            model: "cobalt raq4",
            scope: null,
            trust: 0.8,
            vendor: "sun microsystems",
            version: null,
         },
         {
            model: "openlinux",
            scope: "eq",
            trust: 0.8,
            vendor: "sco",
            version: "3.1.1 (server)",
         },
         {
            model: "open unix",
            scope: "eq",
            trust: 0.8,
            vendor: "sco",
            version: "8.0.0",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "7.0 (sparc)",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "3.0.x (solaris",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "2.1",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.00",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "linux",
         },
         {
            model: "advanced message server",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "aix",
         },
         {
            model: "turbolinux workstation",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "6.0",
         },
         {
            model: "systemwalker it budgetmgr",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "switch",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "aix edition )",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "8.0",
         },
         {
            model: "for nt",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "2.6.x",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "7.3",
         },
         {
            model: "systemwalker listcreator",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 0.8,
            vendor: "openbsd",
            version: "3.3",
         },
         {
            model: "sendmail",
            scope: "lte",
            trust: 0.8,
            vendor: "sendmail consortium",
            version: "8.12.9 and earlier",
         },
         {
            model: "for nt",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "version 3.0.x",
         },
         {
            model: "unixware",
            scope: "eq",
            trust: 0.8,
            vendor: "sco",
            version: "7.1.1",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "2.2.xj (windows nt/2000 edition )",
         },
         {
            model: "turbolinux server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "6.5",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "2.2.x (solaris",
         },
         {
            model: "turbolinux server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "6.1",
         },
         {
            model: "openbsd",
            scope: "lt",
            trust: 0.8,
            vendor: "openbsd",
            version: "version",
         },
         {
            model: "linux advanced workstation",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1",
         },
         {
            model: "advanced message server",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "linux",
         },
         {
            model: "advanced message server",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "aix edition )",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "9",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.11",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "windows nt/2000",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "7.2",
         },
         {
            model: "turbolinux server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "8",
         },
         {
            model: "advanced message server",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "1.3 (windows 2000 edition )",
         },
         {
            model: "teamware office",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.22",
         },
         {
            model: "turbolinux server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "7",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.23",
         },
         {
            model: "irix",
            scope: "eq",
            trust: 0.8,
            vendor: "sgi",
            version: "6.5 (6.5.15 - 6.5.21f)",
         },
         {
            model: "advanced message server",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "2.1.x (solaris",
         },
         {
            model: "openlinux",
            scope: "eq",
            trust: 0.8,
            vendor: "sco",
            version: "3.1.1 (workstation)",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "9 (sparc)",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "3.1.x (solaris",
         },
         {
            model: "bsd/os",
            scope: "eq",
            trust: 0.8,
            vendor: "fore tune",
            version: "5.0",
         },
         {
            model: "cobalt qube3",
            scope: null,
            trust: 0.8,
            vendor: "sun microsystems",
            version: null,
         },
         {
            model: "interstage office square",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "8 (x86)",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1 (ws)",
         },
         {
            model: "openbsd",
            scope: "eq",
            trust: 0.8,
            vendor: "openbsd",
            version: "3.2",
         },
         {
            model: "gnu/linux",
            scope: "eq",
            trust: 0.8,
            vendor: "debian",
            version: "3.0",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "2.1.x (hp-ux edition )",
         },
         {
            model: "freebsd",
            scope: "lt",
            trust: 0.8,
            vendor: "freebsd",
            version: "version",
         },
         {
            model: "asianux server",
            scope: "eq",
            trust: 0.8,
            vendor: "cybertrust",
            version: "2.0",
         },
         {
            model: "unixware",
            scope: "eq",
            trust: 0.8,
            vendor: "sco",
            version: "7.1.3",
         },
         {
            model: "cobalt raqxtr",
            scope: null,
            trust: 0.8,
            vendor: "sun microsystems",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "7.0 (x86)",
         },
         {
            model: "linux 5.0",
            scope: null,
            trust: 0.8,
            vendor: "sun microsystems",
            version: null,
         },
         {
            model: "turbolinux advanced server",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "6",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1 (as)",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.8,
            vendor: "hewlett packard",
            version: "11.04",
         },
         {
            model: "turbolinux workstation",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "8",
         },
         {
            model: "bsd/os",
            scope: "eq",
            trust: 0.8,
            vendor: "fore tune",
            version: "4.3.1",
         },
         {
            model: "gnu/linux",
            scope: "lt",
            trust: 0.8,
            vendor: "debian",
            version: "version",
         },
         {
            model: "enterprise linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "2.1 (es)",
         },
         {
            model: "systemwalker listworks",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "advanced message server",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "2.0.x (solaris",
         },
         {
            model: "advanced message server",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "s390 linux edition )",
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "8 (sparc)",
         },
         {
            model: "turbolinux workstation",
            scope: "eq",
            trust: 0.8,
            vendor: "turbo linux",
            version: "7",
         },
         {
            model: "advanced message server",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "1.2 (solaris",
         },
         {
            model: "systemwalker ip netmgr",
            scope: null,
            trust: 0.8,
            vendor: "fujitsu",
            version: null,
         },
         {
            model: "switch",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "s390 linux edition )",
         },
         {
            model: "cobalt raq550",
            scope: null,
            trust: 0.8,
            vendor: "sun microsystems",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.8,
            vendor: "sun microsystems",
            version: "9 (x86)",
         },
         {
            model: "switch",
            scope: "eq",
            trust: 0.8,
            vendor: "sendmail",
            version: "aix",
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.8,
            vendor: "red hat",
            version: "7.1",
         },
         {
            model: "aix",
            scope: "eq",
            trust: 0.8,
            vendor: "ibm",
            version: "4.3",
         },
         {
            model: "solaris 9 x86",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "solaris",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "9",
         },
         {
            model: "solaris 8 x86",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "solaris 8 sparc",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "solaris 7.0 x86",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "solaris 2.6 x86",
            scope: null,
            trust: 0.3,
            vendor: "sun",
            version: null,
         },
         {
            model: "linux",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "5.0.7",
         },
         {
            model: "cobalt raq",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "550",
         },
         {
            model: "cobalt raq",
            scope: "eq",
            trust: 0.3,
            vendor: "sun",
            version: "4",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.21",
         },
         {
            model: "irix f",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.21",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.20",
         },
         {
            model: "irix f",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.20",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.19",
         },
         {
            model: "irix f",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.19",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.18",
         },
         {
            model: "irix f",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.18",
         },
         {
            model: "irix m",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.17",
         },
         {
            model: "irix f",
            scope: "eq",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.17",
         },
         {
            model: "inc sendmail for nt",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "3.0.3",
         },
         {
            model: "inc sendmail for nt",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "3.0.2",
         },
         {
            model: "inc sendmail for nt",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "3.0.1",
         },
         {
            model: "inc sendmail for nt",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "3.0",
         },
         {
            model: "inc sendmail for nt",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.6.2",
         },
         {
            model: "inc sendmail for nt",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.6.1",
         },
         {
            model: "inc sendmail for nt",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.6",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "3.0.3",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "3.0.2",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "3.0.1",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "3.0",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.2.5",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.2.4",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.2.3",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.2.2",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.2.1",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.2",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.1.5",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.1.4",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.1.3",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.1.2",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.1.1",
         },
         {
            model: "inc sendmail switch",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "2.1",
         },
         {
            model: "inc sendmail pro",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.9.3",
         },
         {
            model: "inc sendmail pro",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.9.2",
         },
         {
            model: "inc sendmail advanced message server",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "1.3",
         },
         {
            model: "inc sendmail advanced message server",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "1.2",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12.9",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12.8",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12.7",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12.6",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12.5",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12.4",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12.3",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12.2",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12.1",
         },
         {
            model: "consortium sendmail beta7",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12",
         },
         {
            model: "consortium sendmail beta5",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12",
         },
         {
            model: "consortium sendmail beta16",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12",
         },
         {
            model: "consortium sendmail beta12",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12",
         },
         {
            model: "consortium sendmail beta10",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12.0",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.11.6",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.11.5",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.11.4",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.11.3",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.11.2",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.11.1",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.11",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.10.2",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.10.1",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.10",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.9.3",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.9.2",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.9.1",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.9.0",
         },
         {
            model: "consortium sendmail",
            scope: "eq",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.8.8",
         },
         {
            model: "beta",
            scope: "eq",
            trust: 0.3,
            vendor: "netbsd",
            version: "1.6",
         },
         {
            model: "netbsd",
            scope: "eq",
            trust: 0.3,
            vendor: "netbsd",
            version: "1.5x86",
         },
         {
            model: "sh3",
            scope: "eq",
            trust: 0.3,
            vendor: "netbsd",
            version: "1.5",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.04",
         },
         {
            model: "hp-ux",
            scope: "eq",
            trust: 0.3,
            vendor: "hp",
            version: "11.0",
         },
         {
            model: "linux rc3",
            scope: "eq",
            trust: 0.3,
            vendor: "gentoo",
            version: "1.4",
         },
         {
            model: "linux rc2",
            scope: "eq",
            trust: 0.3,
            vendor: "gentoo",
            version: "1.4",
         },
         {
            model: "linux rc1",
            scope: "eq",
            trust: 0.3,
            vendor: "gentoo",
            version: "1.4",
         },
         {
            model: "linux a",
            scope: "eq",
            trust: 0.3,
            vendor: "gentoo",
            version: "1.1",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "-release-p5",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.1",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "-release-p14",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "5.0",
         },
         {
            model: "-prerelease",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.9",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-release-p7",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.8",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "-release-p17",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.7",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "-release-p20",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.6",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "-release-p32",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.5",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "-release-p42",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.4",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "-release-p38",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.3",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "4.0",
         },
         {
            model: "-releng",
            scope: "eq",
            trust: 0.3,
            vendor: "freebsd",
            version: "3.0",
         },
         {
            model: "tru64 b pk2",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 b pk1",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 b",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 a pk5",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 a pk4",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 a pk3",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 a pk2",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 a pk1",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 a",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 pk6",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 pk5",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 pk4",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 pk3",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "5.1",
         },
         {
            model: "tru64 g pk4",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "4.0",
         },
         {
            model: "tru64 g pk3",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "4.0",
         },
         {
            model: "tru64 g",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "4.0",
         },
         {
            model: "tru64 f pk8",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "4.0",
         },
         {
            model: "tru64 f pk7",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "4.0",
         },
         {
            model: "tru64 f pk6",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "4.0",
         },
         {
            model: "tru64 f",
            scope: "eq",
            trust: 0.3,
            vendor: "compaq",
            version: "4.0",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.6",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.5",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.4",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.3",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.2",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.1",
         },
         {
            model: "mac os server",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.6",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.5",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.4",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.3",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.2",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2.1",
         },
         {
            model: "mac os",
            scope: "eq",
            trust: 0.3,
            vendor: "apple",
            version: "x10.2",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.22",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.14",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.13",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.12",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.11",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.10",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.9",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.8",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.7",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.6",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.5",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.4",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.3",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.2",
         },
         {
            model: "irix",
            scope: "ne",
            trust: 0.3,
            vendor: "sgi",
            version: "6.5.1",
         },
         {
            model: "consortium sendmail",
            scope: "ne",
            trust: 0.3,
            vendor: "sendmail",
            version: "8.12.10",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#784980",
         },
         {
            db: "BID",
            id: "8641",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000278",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200310-019",
         },
         {
            db: "NVD",
            id: "CVE-2003-0694",
         },
      ],
   },
   configurations: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/configurations#",
         children: {
            "@container": "@list",
         },
         cpe_match: {
            "@container": "@list",
         },
         data: {
            "@container": "@list",
         },
         nodes: {
            "@container": "@list",
         },
      },
      data: [
         {
            CVE_data_version: "4.0",
            nodes: [
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_pro:8.9.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_pro:8.9.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
               {
                  children: [],
                  cpe_match: [
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:4.0g_pk4_bl22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:turbolinux:turbolinux_server:6.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:3.0:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:turbolinux:turbolinux_advanced_server:6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:4.0f_pk8_bl22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:compaq:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:turbolinux:turbolinux_workstation:6.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                     {
                        cpe23Uri: "cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*",
                        cpe_name: [],
                        vulnerable: true,
                     },
                  ],
                  operator: "OR",
               },
            ],
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-0694",
         },
      ],
   },
   credits: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/credits#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Michal Zalewski※ lcamtuf@echelon.pl",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200310-019",
         },
      ],
      trust: 0.6,
   },
   cve: "CVE-2003-0694",
   cvss: {
      "@context": {
         cvssV2: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2",
         },
         cvssV3: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/",
         },
         severity: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/cvss/severity#",
            },
            "@id": "https://www.variotdbs.pl/ref/cvss/severity",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
            "@id": "https://www.variotdbs.pl/ref/sources",
         },
      },
      data: [
         {
            cvssV2: [
               {
                  acInsufInfo: false,
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "NVD",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  obtainAllPrivilege: true,
                  obtainOtherPrivilege: false,
                  obtainUserPrivilege: false,
                  severity: "HIGH",
                  trust: 1,
                  userInteractionRequired: false,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  acInsufInfo: null,
                  accessComplexity: "Low",
                  accessVector: "Network",
                  authentication: "None",
                  author: "NVD",
                  availabilityImpact: "Complete",
                  baseScore: 10,
                  confidentialityImpact: "Complete",
                  exploitabilityScore: null,
                  id: "CVE-2003-0694",
                  impactScore: null,
                  integrityImpact: "Complete",
                  obtainAllPrivilege: null,
                  obtainOtherPrivilege: null,
                  obtainUserPrivilege: null,
                  severity: "High",
                  trust: 0.9,
                  userInteractionRequired: null,
                  vectorString: "AV:N/AC:L/Au:N/C:C/I:C/A:C",
                  version: "2.0",
               },
               {
                  accessComplexity: "LOW",
                  accessVector: "NETWORK",
                  authentication: "NONE",
                  author: "VULHUB",
                  availabilityImpact: "COMPLETE",
                  baseScore: 10,
                  confidentialityImpact: "COMPLETE",
                  exploitabilityScore: 10,
                  id: "VHN-7519",
                  impactScore: 10,
                  integrityImpact: "COMPLETE",
                  severity: "HIGH",
                  trust: 0.1,
                  vectorString: "AV:N/AC:L/AU:N/C:C/I:C/A:C",
                  version: "2.0",
               },
            ],
            cvssV3: [],
            severity: [
               {
                  author: "NVD",
                  id: "CVE-2003-0694",
                  trust: 1.8,
                  value: "HIGH",
               },
               {
                  author: "CARNEGIE MELLON",
                  id: "VU#784980",
                  trust: 0.8,
                  value: "36.72",
               },
               {
                  author: "CNNVD",
                  id: "CNNVD-200310-019",
                  trust: 0.6,
                  value: "CRITICAL",
               },
               {
                  author: "VULHUB",
                  id: "VHN-7519",
                  trust: 0.1,
                  value: "HIGH",
               },
               {
                  author: "VULMON",
                  id: "CVE-2003-0694",
                  trust: 0.1,
                  value: "HIGH",
               },
            ],
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#784980",
         },
         {
            db: "VULHUB",
            id: "VHN-7519",
         },
         {
            db: "VULMON",
            id: "CVE-2003-0694",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000278",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200310-019",
         },
         {
            db: "NVD",
            id: "CVE-2003-0694",
         },
      ],
   },
   description: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/description#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. sendmail A buffer overflow vulnerability was discovered in the email address parsing process. This vulnerability CERT Advisory CA-2003-07, CA-2003-12 This is a new vulnerability that differs from the vulnerability reported in. As for the vulnerability, there is a possibility that a third party may obtain administrator authority from a remote location. This problem, sendmail Occurs by receiving a message with a maliciously configured email address. For this reason, LAN Is running on a host sendmail Even other MTA (Mail Transfer Agent) If you receive a malicious message relayed from, you may be affected by the vulnerability.Service operation interruption (denial-of-service, DoS) An attacker or a remote third party may gain administrative privileges.  This issue is different than the vulnerability described in BID 7230. Sendmail is one of the most popular mail transfer agents (MTAs) on the Internet. The local exploitation method on Linux can use recipient.c and sendtolist() to overwrite the pointer with the data submitted by the user. When calling the free() function, the command may be redirected, and the attacker can construct a malicious email message and submit it to Sendmail for analysis. Execute arbitrary commands on the system with Sendmail process privileges. There may also be other exploit methods, and it is also possible to exploit this vulnerability remotely",
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-0694",
         },
         {
            db: "CERT/CC",
            id: "VU#784980",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000278",
         },
         {
            db: "BID",
            id: "8641",
         },
         {
            db: "VULHUB",
            id: "VHN-7519",
         },
         {
            db: "VULMON",
            id: "CVE-2003-0694",
         },
      ],
      trust: 2.79,
   },
   external_ids: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#784980",
            trust: 3.4,
         },
         {
            db: "NVD",
            id: "CVE-2003-0694",
            trust: 2.9,
         },
         {
            db: "BID",
            id: "8641",
            trust: 1.3,
         },
         {
            db: "XF",
            id: "13204",
            trust: 0.8,
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000278",
            trust: 0.8,
         },
         {
            db: "CNNVD",
            id: "CNNVD-200310-019",
            trust: 0.7,
         },
         {
            db: "CONECTIVA",
            id: "CLA-2003:742",
            trust: 0.6,
         },
         {
            db: "REDHAT",
            id: "RHSA-2003:284",
            trust: 0.6,
         },
         {
            db: "REDHAT",
            id: "RHSA-2003:283",
            trust: 0.6,
         },
         {
            db: "CERT/CC",
            id: "CA-2003-25",
            trust: 0.6,
         },
         {
            db: "VULNWATCH",
            id: "20030917 ZALEWSKI ADVISORY - SENDMAIL 8.12.9 PRESCAN BUG",
            trust: 0.6,
         },
         {
            db: "SCO",
            id: "SCOSA-2004.11",
            trust: 0.6,
         },
         {
            db: "MANDRAKE",
            id: "MDKSA-2003:092",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20030917 GLSA: SENDMAIL (200309-13)",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20030917 [SLACKWARE-SECURITY] SENDMAIL VULNERABILITIES FIXED (SSA:2003-260-02)",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20030917 SENDMAIL 8.12.9 PRESCAN BUG (A NEW ONE) [CAN-2003-0694]",
            trust: 0.6,
         },
         {
            db: "BUGTRAQ",
            id: "20030919 [OPENPKG-SA-2003.041] OPENPKG SECURITY ADVISORY (SENDMAIL)",
            trust: 0.6,
         },
         {
            db: "OVAL",
            id: "OVAL:ORG.MITRE.OVAL:DEF:603",
            trust: 0.6,
         },
         {
            db: "OVAL",
            id: "OVAL:ORG.MITRE.OVAL:DEF:2975",
            trust: 0.6,
         },
         {
            db: "OVAL",
            id: "OVAL:ORG.MITRE.OVAL:DEF:572",
            trust: 0.6,
         },
         {
            db: "FULLDISC",
            id: "20030917 SENDMAIL 8.12.9 PRESCAN BUG (A NEW ONE) [CAN-2003-0694]",
            trust: 0.6,
         },
         {
            db: "DEBIAN",
            id: "DSA-384",
            trust: 0.6,
         },
         {
            db: "VULHUB",
            id: "VHN-7519",
            trust: 0.1,
         },
         {
            db: "VULMON",
            id: "CVE-2003-0694",
            trust: 0.1,
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#784980",
         },
         {
            db: "VULHUB",
            id: "VHN-7519",
         },
         {
            db: "VULMON",
            id: "CVE-2003-0694",
         },
         {
            db: "BID",
            id: "8641",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000278",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200310-019",
         },
         {
            db: "NVD",
            id: "CVE-2003-0694",
         },
      ],
   },
   id: "VAR-200310-0072",
   iot: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/iot#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: true,
      sources: [
         {
            db: "VULHUB",
            id: "VHN-7519",
         },
      ],
      trust: 0.01,
   },
   last_update_date: "2024-07-23T19:31:47.530000Z",
   patch: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/patch#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            title: "ca-2003-25",
            trust: 0.8,
            url: "http://software.fujitsu.com/jp/security/vulnerabilities/cert/cert2003.html#ca-2003-25",
         },
         {
            title: "DSA-384-1",
            trust: 0.8,
            url: "http://www.debian.org/security/2003/dsa-384",
         },
         {
            title: "FreeBSD-SA-03:13.sendmail ",
            trust: 0.8,
            url: "http://security.freebsd.org/advisories/freebsd-sa-03:13.sendmail.asc",
         },
         {
            title: "HPSBUX00281",
            trust: 0.8,
            url: "http://h20000.www2.hp.com/bizsupport/techsupport/document.jsp?lang=en&cc=us&objectid=c01035741",
         },
         {
            title: "IY48657",
            trust: 0.8,
            url: "http://www-1.ibm.com/support/docview.wss?uid=isg1iy48657",
         },
         {
            title: "IY48659",
            trust: 0.8,
            url: "http://www-1.ibm.com/support/docview.wss?uid=isg1iy48659",
         },
         {
            title: "IY48658",
            trust: 0.8,
            url: "http://www-1.ibm.com/support/docview.wss?uid=isg1iy48658",
         },
         {
            title: "MSS-OAR-E01-2003.1473.1",
            trust: 0.8,
            url: "http://www-1.ibm.com/services/continuity/recover1.nsf/mss/mss-oar-e01-2003.1473.1",
         },
         {
            title: "sendmail (V2.x)",
            trust: 0.8,
            url: "http://www.miraclelinux.com/update/linux/list.php?errata_id=150",
         },
         {
            title: "NetBSD-SA2003-016",
            trust: 0.8,
            url: "ftp://ftp.netbsd.org/pub/netbsd/security/advisories/netbsd-sa2003-016.txt.asc",
         },
         {
            title: "018: SECURITY FIX: September 17, 2003",
            trust: 0.8,
            url: "http://www.openbsd.org/errata32.html#sendmail4",
         },
         {
            title: "005: SECURITY FIX: September 17, 2003",
            trust: 0.8,
            url: "http://www.openbsd.org/errata33.html#sendmail",
         },
         {
            title: "RHSA-2003:283",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/rhsa-2003-283.html",
         },
         {
            title: "RHSA-2003:284",
            trust: 0.8,
            url: "https://rhn.redhat.com/errata/rhsa-2003-284.html",
         },
         {
            title: "CSSA-2003-036.0",
            trust: 0.8,
            url: "ftp://ftp.sco.com/pub/security/openlinux/cssa-2003-036.0.txt",
         },
         {
            title: "CSSA-2003-SCO.23.1",
            trust: 0.8,
            url: "ftp://ftp.sco.com/pub/updates/unixware/cssa-2003-sco.23/cssa-2003-sco.23.txt",
         },
         {
            title: "8.12.10",
            trust: 0.8,
            url: "http://www.sendmail.org/8.12.10.html",
         },
         {
            title: "2003-9-17",
            trust: 0.8,
            url: "http://www.sendmail.com/security/",
         },
         {
            title: "20030903-01-P",
            trust: 0.8,
            url: "ftp://patches.sgi.com/support/free/security/advisories/20030903-01-p.asc",
         },
         {
            title: "56922",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-1",
         },
         {
            title: "56860",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56860-1",
         },
         {
            title: "56922",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56922-3",
         },
         {
            title: "56860",
            trust: 0.8,
            url: "http://sunsolve.sun.com/search/document.do?assetkey=1-26-56860-3",
         },
         {
            title: "XTR Sendmail Security Update 1.0.1",
            trust: 0.8,
            url: "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng&nav=patchpage",
         },
         {
            title: "550 Sendmail Security Update 0.0.1",
            trust: 0.8,
            url: "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng&nav=patchpage",
         },
         {
            title: "4 Sendmail Security Update 2.0.2",
            trust: 0.8,
            url: "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng&nav=patchpage",
         },
         {
            title: "TLSA-2003-52",
            trust: 0.8,
            url: "http://www.turbolinux.com/security/2003/tlsa-2003-52.txt",
         },
         {
            title: "Sendmail Inc. Information for VU#784980",
            trust: 0.8,
            url: "http://www.kb.cert.org/vuls/id/aamn-5rhq64",
         },
         {
            title: "M500-012",
            trust: 0.8,
            url: "ftp://ftp.foretune.co.jp/pub/bsdos/patches-5.0/m500-012.ia32",
         },
         {
            title: "M431-011",
            trust: 0.8,
            url: "ftp://ftp.foretune.co.jp/pub/bsdos/patches-4.3.1/i386/m431-011",
         },
         {
            title: "RHSA-2003:283",
            trust: 0.8,
            url: "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-283j.html",
         },
         {
            title: "RHSA-2003:284",
            trust: 0.8,
            url: "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-284j.html",
         },
         {
            title: "TLSA-2003-52",
            trust: 0.8,
            url: "http://www.turbolinux.co.jp/security/2003/tlsa-2003-52j.txt",
         },
         {
            title: "Debian Security Advisories: DSA-384-1 sendmail -- buffer overflows",
            trust: 0.1,
            url: "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=243b978e3f17d13dd590ac7cfc4a472f",
         },
         {
            title: "cumes",
            trust: 0.1,
            url: "https://github.com/byte-mug/cumes ",
         },
         {
            title: "x0rzEQGRP",
            trust: 0.1,
            url: "https://github.com/happysmack/x0rzeqgrp ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/nekkidso/eqgrp ",
         },
         {
            title: "test",
            trust: 0.1,
            url: "https://github.com/devkosov/test ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/hackcrypto/eqgrp ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/ninja-tw1st/eqgrp ",
         },
         {
            title: "leaked2",
            trust: 0.1,
            url: "https://github.com/kongjiexi/leaked2 ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/391861737/eqgrp ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/muhammd/eqgrp ",
         },
         {
            title: "ShadowBrokersFiles",
            trust: 0.1,
            url: "https://github.com/r3k1ng/shadowbrokersfiles ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/ckmaenn/eqgrp ",
         },
         {
            title: "EQGRP_Linux",
            trust: 0.1,
            url: "https://github.com/cybernetix-s3c/eqgrp_linux ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/iha114/eqgrp ",
         },
         {
            title: "ShadowBrokersFiles",
            trust: 0.1,
            url: "https://github.com/antiscammerarmy/shadowbrokersfiles ",
         },
         {
            title: "shadowbrokerstuff",
            trust: 0.1,
            url: "https://github.com/thetrentusdev/shadowbrokerstuff ",
         },
         {
            title: "bdhglopoj",
            trust: 0.1,
            url: "https://github.com/maxcvnd/bdhglopoj ",
         },
         {
            title: "shadowbrokerstuff",
            trust: 0.1,
            url: "https://github.com/shakenetwork/shadowbrokerstuff ",
         },
         {
            title: "x0rz-EQGRP",
            trust: 0.1,
            url: "https://github.com/r3p3r/x0rz-eqgrp ",
         },
         {
            title: "ShadowBrokersStuff",
            trust: 0.1,
            url: "https://github.com/thetrentus/shadowbrokersstuff ",
         },
         {
            title: "EQ1",
            trust: 0.1,
            url: "https://github.com/thepevertedspartan/eq1 ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/badbug6/eqgrp ",
         },
         {
            title: "EQGRP-nasa",
            trust: 0.1,
            url: "https://github.com/soldie/eqgrp-nasa ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/mofty/eqgrp ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/thetrentus/eqgrp ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/namangangwar/eqgrp ",
         },
         {
            title: "EQGRP",
            trust: 0.1,
            url: "https://github.com/x0rz/eqgrp ",
         },
         {
            title: "SB--.-HACK-the-EQGRP-1",
            trust: 0.1,
            url: "https://github.com/cipherreborn/sb--.-hack-the-eqgrp-1 ",
         },
      ],
      sources: [
         {
            db: "VULMON",
            id: "CVE-2003-0694",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000278",
         },
      ],
   },
   problemtype_data: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            problemtype: "NVD-CWE-Other",
            trust: 1,
         },
      ],
      sources: [
         {
            db: "NVD",
            id: "CVE-2003-0694",
         },
      ],
   },
   references: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/references#",
         data: {
            "@container": "@list",
         },
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: [
         {
            trust: 2.9,
            url: "http://www.cert.org/advisories/ca-2003-25.html",
         },
         {
            trust: 2.7,
            url: "http://www.kb.cert.org/vuls/id/784980",
         },
         {
            trust: 2.6,
            url: "http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html",
         },
         {
            trust: 2.6,
            url: "http://www.sendmail.org/8.12.10.html",
         },
         {
            trust: 1.8,
            url: "http://www.debian.org/security/2003/dsa-384",
         },
         {
            trust: 1.8,
            url: "http://www.mandriva.com/security/advisories?name=mdksa-2003:092",
         },
         {
            trust: 1.8,
            url: "http://www.redhat.com/support/errata/rhsa-2003-283.html",
         },
         {
            trust: 1.8,
            url: "http://www.redhat.com/support/errata/rhsa-2003-284.html",
         },
         {
            trust: 1.8,
            url: "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.11/scosa-2004.11.txt",
         },
         {
            trust: 1.8,
            url: "http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html",
         },
         {
            trust: 1.7,
            url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742",
         },
         {
            trust: 1.2,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a2975",
         },
         {
            trust: 1.2,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a572",
         },
         {
            trust: 1.2,
            url: "https://oval.cisecurity.org/repository/search/definition/oval%3aorg.mitre.oval%3adef%3a603",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=106383437615742&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=106382859407683&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=106381604923204&w=2",
         },
         {
            trust: 1.1,
            url: "http://marc.info/?l=bugtraq&m=106398718909274&w=2",
         },
         {
            trust: 0.9,
            url: "http://www.securityfocus.com/bid/8641",
         },
         {
            trust: 0.8,
            url: "http://archives.neohapsis.com/archives/sendmail/2003-q3/0002.html",
         },
         {
            trust: 0.8,
            url: "http://www.sendmail.org/patches/parse8.359.2.8",
         },
         {
            trust: 0.8,
            url: "http://www.ciac.org/ciac/bulletins/n-149.shtml",
         },
         {
            trust: 0.8,
            url: "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0694",
         },
         {
            trust: 0.8,
            url: "http://xforce.iss.net/xforce/xfdb/13204",
         },
         {
            trust: 0.8,
            url: "http://www.jpcert.or.jp/wr/2003/wr033901.txt",
         },
         {
            trust: 0.8,
            url: "http://www.jpcert.or.jp/wr/2003/wr034001.txt",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/cert/jvnca-2003-25",
         },
         {
            trust: 0.8,
            url: "http://jvn.jp/tr/trca-2003-25",
         },
         {
            trust: 0.8,
            url: "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0694",
         },
         {
            trust: 0.8,
            url: "http://www.cyberpolice.go.jp/important/20030918_190150.html",
         },
         {
            trust: 0.6,
            url: "http://marc.theaimsgroup.com/?l=bugtraq&m=106398718909274&w=2",
         },
         {
            trust: 0.6,
            url: "http://marc.theaimsgroup.com/?l=bugtraq&m=106383437615742&w=2",
         },
         {
            trust: 0.6,
            url: "http://marc.theaimsgroup.com/?l=bugtraq&m=106382859407683&w=2",
         },
         {
            trust: 0.6,
            url: "http://marc.theaimsgroup.com/?l=bugtraq&m=106381604923204&w=2",
         },
         {
            trust: 0.6,
            url: "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:603",
         },
         {
            trust: 0.6,
            url: "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:572",
         },
         {
            trust: 0.6,
            url: "http://oval.mitre.org/repository/data/getdef?id=oval:org.mitre.oval:def:2975",
         },
         {
            trust: 0.3,
            url: "http://www-1.ibm.com/servers/aix/",
         },
         {
            trust: 0.3,
            url: "http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=000746",
         },
         {
            trust: 0.3,
            url: "http://www.sendmail.org/",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56860",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f56922",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/qube3.eng&nav=patchpage",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng&nav=patchpage",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng&nav=patchpage",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng&nav=patchpage",
         },
         {
            trust: 0.3,
            url: "http://sunsolve.sun.com/patches/linux/security.html",
         },
         {
            trust: 0.3,
            url: "http://ftp.support.compaq.com/patches/public/unix/v4.0g/t64kit0020132-v40gb22-es-20031001.readme",
         },
         {
            trust: 0.3,
            url: "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-553-sendmail-ssrt3631.readme",
         },
         {
            trust: 0.3,
            url: "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-563-sendmail-ssrt3631.readme",
         },
         {
            trust: 0.3,
            url: "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-586-sendmail-ssrt3631.readme",
         },
         {
            trust: 0.3,
            url: "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51ab-ix-594-sendmail-ssrt3631.readme",
         },
         {
            trust: 0.3,
            url: "/archive/1/337839",
         },
         {
            trust: 0.1,
            url: "http://marc.info/?l=bugtraq&m=106383437615742&w=2",
         },
         {
            trust: 0.1,
            url: "http://marc.info/?l=bugtraq&m=106381604923204&w=2",
         },
         {
            trust: 0.1,
            url: "http://marc.info/?l=bugtraq&m=106382859407683&w=2",
         },
         {
            trust: 0.1,
            url: "http://marc.info/?l=bugtraq&m=106398718909274&w=2",
         },
         {
            trust: 0.1,
            url: "http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742",
         },
         {
            trust: 0.1,
            url: "",
         },
         {
            trust: 0.1,
            url: "https://cwe.mitre.org/data/definitions/.html",
         },
         {
            trust: 0.1,
            url: "https://nvd.nist.gov",
         },
         {
            trust: 0.1,
            url: "https://www.debian.org/security/./dsa-384",
         },
         {
            trust: 0.1,
            url: "https://github.com/byte-mug/cumes",
         },
      ],
      sources: [
         {
            db: "CERT/CC",
            id: "VU#784980",
         },
         {
            db: "VULHUB",
            id: "VHN-7519",
         },
         {
            db: "VULMON",
            id: "CVE-2003-0694",
         },
         {
            db: "BID",
            id: "8641",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000278",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200310-019",
         },
         {
            db: "NVD",
            id: "CVE-2003-0694",
         },
      ],
   },
   sources: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            db: "CERT/CC",
            id: "VU#784980",
         },
         {
            db: "VULHUB",
            id: "VHN-7519",
         },
         {
            db: "VULMON",
            id: "CVE-2003-0694",
         },
         {
            db: "BID",
            id: "8641",
         },
         {
            db: "JVNDB",
            id: "JVNDB-2003-000278",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200310-019",
         },
         {
            db: "NVD",
            id: "CVE-2003-0694",
         },
      ],
   },
   sources_release_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2003-09-17T00:00:00",
            db: "CERT/CC",
            id: "VU#784980",
         },
         {
            date: "2003-10-06T00:00:00",
            db: "VULHUB",
            id: "VHN-7519",
         },
         {
            date: "2003-10-06T00:00:00",
            db: "VULMON",
            id: "CVE-2003-0694",
         },
         {
            date: "2003-09-17T00:00:00",
            db: "BID",
            id: "8641",
         },
         {
            date: "2007-04-01T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2003-000278",
         },
         {
            date: "2003-09-17T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200310-019",
         },
         {
            date: "2003-10-06T04:00:00",
            db: "NVD",
            id: "CVE-2003-0694",
         },
      ],
   },
   sources_update_date: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
         data: {
            "@container": "@list",
         },
      },
      data: [
         {
            date: "2003-09-29T00:00:00",
            db: "CERT/CC",
            id: "VU#784980",
         },
         {
            date: "2018-10-30T00:00:00",
            db: "VULHUB",
            id: "VHN-7519",
         },
         {
            date: "2018-10-30T00:00:00",
            db: "VULMON",
            id: "CVE-2003-0694",
         },
         {
            date: "2009-07-11T23:56:00",
            db: "BID",
            id: "8641",
         },
         {
            date: "2007-08-28T00:00:00",
            db: "JVNDB",
            id: "JVNDB-2003-000278",
         },
         {
            date: "2006-08-24T00:00:00",
            db: "CNNVD",
            id: "CNNVD-200310-019",
         },
         {
            date: "2018-10-30T16:26:22.763000",
            db: "NVD",
            id: "CVE-2003-0694",
         },
      ],
   },
   threat_type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "remote",
      sources: [
         {
            db: "CNNVD",
            id: "CNNVD-200310-019",
         },
      ],
      trust: 0.6,
   },
   title: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/title#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Sendmail prescan() buffer overflow vulnerability",
      sources: [
         {
            db: "CERT/CC",
            id: "VU#784980",
         },
      ],
      trust: 0.8,
   },
   type: {
      "@context": {
         "@vocab": "https://www.variotdbs.pl/ref/type#",
         sources: {
            "@container": "@list",
            "@context": {
               "@vocab": "https://www.variotdbs.pl/ref/sources#",
            },
         },
      },
      data: "Boundary Condition Error",
      sources: [
         {
            db: "BID",
            id: "8641",
         },
         {
            db: "CNNVD",
            id: "CNNVD-200310-019",
         },
      ],
      trust: 0.9,
   },
}

jvndb-2009-002358
Vulnerability from jvndb
Published
2009-12-28 11:19
Modified
2009-12-28 11:19
Severity ?
() - -
Summary
Fujitsu Interstage and Systemwalker SSL Vulnerabilities
Details
Fujitsu Interstage and Systemwalker related products have the vulnerabilities listed below: - A buffer overflow vulnerability that can occur when the SSL server verifies the client's certificate. - A vulnerability that makes it possible to make an SSL connection using a server or client certificate issued by the old CA certificate after the CA certificate is renewed, regardless of the settings of the certificate environment variables. - A vulnerability where the depletion of resources, such as file descriptors, can occur on the SSL server.
References
Show details on JVN DB website


{
   "@rdf:about": "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-002358.html",
   "dc:date": "2009-12-28T11:19+09:00",
   "dcterms:issued": "2009-12-28T11:19+09:00",
   "dcterms:modified": "2009-12-28T11:19+09:00",
   description: "Fujitsu Interstage and Systemwalker related products have the vulnerabilities listed below:\r\n- A buffer overflow vulnerability that can occur when the SSL server verifies the client's certificate.\r\n- A vulnerability that makes it possible to make an SSL connection using a server or client certificate issued by the old CA certificate after the CA certificate is renewed, regardless of the settings of the certificate environment variables.\r\n- A vulnerability where the depletion of resources, such as file descriptors, can occur on the SSL server.",
   link: "https://jvndb.jvn.jp/en/contents/2009/JVNDB-2009-002358.html",
   "sec:cpe": [
      {
         "#text": "cpe:/a:fujitsu:infodirectory",
         "@product": "InfoDirectory",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:infoprovider_pro",
         "@product": "InfoProvider Pro",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:infoproxy",
         "@product": "InfoProxy",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:infoproxy_for_middleware",
         "@product": "InfoProxy for Middleware",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:interstage",
         "@product": "Interstage",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:interstage_apcoordinator",
         "@product": "Interstage Apcoordinator",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:interstage_application_framework_suite",
         "@product": "Interstage Application Framework Suite",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:interstage_application_server",
         "@product": "Interstage Application Server",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:interstage_apworks",
         "@product": "Interstage Apworks",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:interstage_business_application_manager",
         "@product": "Interstage Business Application Manager",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:interstage_form_coordinator_syomei_option",
         "@product": "Interstage Form Coordinator syomei option",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:interstage_security_director",
         "@product": "Interstage Security Director",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:interstage_traffic_director",
         "@product": "Interstage Traffic Director",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:linkexpress",
         "@product": "Linkexpress",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:safeauthor",
         "@product": "Safeauthor",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:safegate",
         "@product": "Safegate",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:safegate_client",
         "@product": "safegate Client",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:safegate_syutyu_kanri",
         "@product": "Safegate syutyu kanri",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:symfoware_universal_data_interchanger",
         "@product": "SymfoWARE Universal Data Interchanger",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:systemwalker_centricmgr-a",
         "@product": "Systemwalker CentricMGR-A",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:systemwalker_centric_manager",
         "@product": "Systemwalker Centric Manager",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:systemwalker_desktop_inspection",
         "@product": "Systemwalker Desktop Inspection",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:systemwalker_desktop_patrol",
         "@product": "Systemwalker Desktop Patrol",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:systemwalker_formcoordinator_syomei_option",
         "@product": "Systemwalker Formcoordinator syomei option",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:systemwalker_infodirectory",
         "@product": "SystemWalker/InfoDirectory",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:systemwalker_it_budgetmgr",
         "@product": "SystemWalker IT BudgetMGR",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:systemwalker_it_budget_manager",
         "@product": "Systemwalker IT Budget Manager",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:systemwalker_software_delivery",
         "@product": "Systemwalker Software Delivery",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:trademaster",
         "@product": "TRADEMASTER",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
      {
         "#text": "cpe:/a:fujitsu:trmaster",
         "@product": "TRMASTER",
         "@vendor": "FUJITSU",
         "@version": "2.2",
      },
   ],
   "sec:cvss": {
      "@score": "5.0",
      "@severity": "Medium",
      "@type": "Base",
      "@vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
      "@version": "2.0",
   },
   "sec:identifier": "JVNDB-2009-002358",
   "sec:references": [
      {
         "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
         "@id": "CWE-119",
         "@title": "Buffer Errors(CWE-119)",
      },
      {
         "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
         "@id": "CWE-287",
         "@title": "Improper Authentication(CWE-287)",
      },
      {
         "#text": "https://www.ipa.go.jp/en/security/vulnerabilities/cwe.html",
         "@id": "CWE-399",
         "@title": "Resource Management Errors(CWE-399)",
      },
   ],
   title: "Fujitsu Interstage and Systemwalker SSL Vulnerabilities",
}