All the vulnerabilites related to hp - sis
cve-2003-0161
Vulnerability from cvelistv5
Published
2003-04-01 05:00
Modified
2024-08-08 01:43
Severity ?
Summary
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
References
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1vendor-advisory, x_refsource_SUNALERT
http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1vendor-advisory, x_refsource_SUNALERT
ftp://patches.sgi.com/support/free/security/advisories/20030401-01-Pvendor-advisory, x_refsource_SGI
http://www.securityfocus.com/bid/7230vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=104914999806315&w=2mailing-list, x_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2003-120.htmlvendor-advisory, x_refsource_REDHAT
http://www.securityfocus.com/archive/1/317135/30/25220/threadedmailing-list, x_refsource_BUGTRAQ
http://www.debian.org/security/2003/dsa-278vendor-advisory, x_refsource_DEBIAN
http://www.debian.org/security/2003/dsa-290vendor-advisory, x_refsource_DEBIAN
http://www.securityfocus.com/archive/1/317135/30/25220/threadedvendor-advisory, x_refsource_IMMUNIX
http://lists.apple.com/mhonarc/security-announce/msg00028.htmlx_refsource_CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1vendor-advisory, x_refsource_SUNALERT
http://www.cert.org/advisories/CA-2003-12.htmlthird-party-advisory, x_refsource_CERT
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txtvendor-advisory, x_refsource_CALDERA
http://www.securityfocus.com/archive/1/316961/30/25250/threadedmailing-list, x_refsource_BUGTRAQ
http://www.redhat.com/support/errata/RHSA-2003-121.htmlvendor-advisory, x_refsource_REDHAT
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000614vendor-advisory, x_refsource_CONECTIVA
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txtvendor-advisory, x_refsource_SCO
http://www.gentoo.org/security/en/glsa/glsa-200303-27.xmlvendor-advisory, x_refsource_GENTOO
http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.htmlmailing-list, x_refsource_FULLDISC
http://marc.info/?l=bugtraq&m=104897487512238&w=2mailing-list, x_refsource_BUGTRAQ
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.ascvendor-advisory, x_refsource_FREEBSD
http://www.securityfocus.com/archive/1/321997mailing-list, x_refsource_BUGTRAQ
http://marc.info/?l=bugtraq&m=104896621106790&w=2mailing-list, x_refsource_BUGTRAQ
http://www.kb.cert.org/vuls/id/897604third-party-advisory, x_refsource_CERT-VN
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:43:36.017Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "1001088",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
          },
          {
            "name": "52620",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
          },
          {
            "name": "20030401-01-P",
            "tags": [
              "vendor-advisory",
              "x_refsource_SGI",
              "x_transferred"
            ],
            "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P"
          },
          {
            "name": "7230",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/7230"
          },
          {
            "name": "20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
          },
          {
            "name": "RHSA-2003:120",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-120.html"
          },
          {
            "name": "20030401 Immunix Secured OS 7+ openssl update",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
          },
          {
            "name": "DSA-278",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-278"
          },
          {
            "name": "DSA-290",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-290"
          },
          {
            "name": "IMNX-2003-7+-002-01",
            "tags": [
              "vendor-advisory",
              "x_refsource_IMMUNIX",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
          },
          {
            "name": "52700",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUNALERT",
              "x_transferred"
            ],
            "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
          },
          {
            "name": "CA-2003-12",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT",
              "x_transferred"
            ],
            "url": "http://www.cert.org/advisories/CA-2003-12.html"
          },
          {
            "name": "CSSA-2003-016.0",
            "tags": [
              "vendor-advisory",
              "x_refsource_CALDERA",
              "x_transferred"
            ],
            "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt"
          },
          {
            "name": "20030331 GLSA: sendmail (200303-27)",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
          },
          {
            "name": "RHSA-2003:121",
            "tags": [
              "vendor-advisory",
              "x_refsource_REDHAT",
              "x_transferred"
            ],
            "url": "http://www.redhat.com/support/errata/RHSA-2003-121.html"
          },
          {
            "name": "CLA-2003:614",
            "tags": [
              "vendor-advisory",
              "x_refsource_CONECTIVA",
              "x_transferred"
            ],
            "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
          },
          {
            "name": "SCOSA-2004.11",
            "tags": [
              "vendor-advisory",
              "x_refsource_SCO",
              "x_transferred"
            ],
            "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt"
          },
          {
            "name": "GLSA-200303-27",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
          },
          {
            "name": "20030329 Sendmail: -1 gone wild",
            "tags": [
              "mailing-list",
              "x_refsource_FULLDISC",
              "x_transferred"
            ],
            "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html"
          },
          {
            "name": "20030329 Sendmail: -1 gone wild",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
          },
          {
            "name": "FreeBSD-SA-03:07",
            "tags": [
              "vendor-advisory",
              "x_refsource_FREEBSD",
              "x_transferred"
            ],
            "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc"
          },
          {
            "name": "20030520 [Fwd: 127 Research and Development: 127 Day!]",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/archive/1/321997"
          },
          {
            "name": "20030329 sendmail 8.12.9 available",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
          },
          {
            "name": "VU#897604",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/897604"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-03-29T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-19T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "1001088",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
        },
        {
          "name": "52620",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
        },
        {
          "name": "20030401-01-P",
          "tags": [
            "vendor-advisory",
            "x_refsource_SGI"
          ],
          "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P"
        },
        {
          "name": "7230",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/7230"
        },
        {
          "name": "20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
        },
        {
          "name": "RHSA-2003:120",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-120.html"
        },
        {
          "name": "20030401 Immunix Secured OS 7+ openssl update",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
        },
        {
          "name": "DSA-278",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-278"
        },
        {
          "name": "DSA-290",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-290"
        },
        {
          "name": "IMNX-2003-7+-002-01",
          "tags": [
            "vendor-advisory",
            "x_refsource_IMMUNIX"
          ],
          "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
        },
        {
          "name": "52700",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUNALERT"
          ],
          "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
        },
        {
          "name": "CA-2003-12",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT"
          ],
          "url": "http://www.cert.org/advisories/CA-2003-12.html"
        },
        {
          "name": "CSSA-2003-016.0",
          "tags": [
            "vendor-advisory",
            "x_refsource_CALDERA"
          ],
          "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt"
        },
        {
          "name": "20030331 GLSA: sendmail (200303-27)",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
        },
        {
          "name": "RHSA-2003:121",
          "tags": [
            "vendor-advisory",
            "x_refsource_REDHAT"
          ],
          "url": "http://www.redhat.com/support/errata/RHSA-2003-121.html"
        },
        {
          "name": "CLA-2003:614",
          "tags": [
            "vendor-advisory",
            "x_refsource_CONECTIVA"
          ],
          "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
        },
        {
          "name": "SCOSA-2004.11",
          "tags": [
            "vendor-advisory",
            "x_refsource_SCO"
          ],
          "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt"
        },
        {
          "name": "GLSA-200303-27",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
        },
        {
          "name": "20030329 Sendmail: -1 gone wild",
          "tags": [
            "mailing-list",
            "x_refsource_FULLDISC"
          ],
          "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html"
        },
        {
          "name": "20030329 Sendmail: -1 gone wild",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
        },
        {
          "name": "FreeBSD-SA-03:07",
          "tags": [
            "vendor-advisory",
            "x_refsource_FREEBSD"
          ],
          "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc"
        },
        {
          "name": "20030520 [Fwd: 127 Research and Development: 127 Day!]",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://www.securityfocus.com/archive/1/321997"
        },
        {
          "name": "20030329 sendmail 8.12.9 available",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
        },
        {
          "name": "VU#897604",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/897604"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0161",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "1001088",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
            },
            {
              "name": "52620",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
            },
            {
              "name": "20030401-01-P",
              "refsource": "SGI",
              "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P"
            },
            {
              "name": "7230",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/7230"
            },
            {
              "name": "20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail)",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
            },
            {
              "name": "RHSA-2003:120",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-120.html"
            },
            {
              "name": "20030401 Immunix Secured OS 7+ openssl update",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
            },
            {
              "name": "DSA-278",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-278"
            },
            {
              "name": "DSA-290",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-290"
            },
            {
              "name": "IMNX-2003-7+-002-01",
              "refsource": "IMMUNIX",
              "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
            },
            {
              "name": "http://lists.apple.com/mhonarc/security-announce/msg00028.html",
              "refsource": "CONFIRM",
              "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
            },
            {
              "name": "52700",
              "refsource": "SUNALERT",
              "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
            },
            {
              "name": "CA-2003-12",
              "refsource": "CERT",
              "url": "http://www.cert.org/advisories/CA-2003-12.html"
            },
            {
              "name": "CSSA-2003-016.0",
              "refsource": "CALDERA",
              "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt"
            },
            {
              "name": "20030331 GLSA: sendmail (200303-27)",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
            },
            {
              "name": "RHSA-2003:121",
              "refsource": "REDHAT",
              "url": "http://www.redhat.com/support/errata/RHSA-2003-121.html"
            },
            {
              "name": "CLA-2003:614",
              "refsource": "CONECTIVA",
              "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
            },
            {
              "name": "SCOSA-2004.11",
              "refsource": "SCO",
              "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt"
            },
            {
              "name": "GLSA-200303-27",
              "refsource": "GENTOO",
              "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
            },
            {
              "name": "20030329 Sendmail: -1 gone wild",
              "refsource": "FULLDISC",
              "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html"
            },
            {
              "name": "20030329 Sendmail: -1 gone wild",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
            },
            {
              "name": "FreeBSD-SA-03:07",
              "refsource": "FREEBSD",
              "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc"
            },
            {
              "name": "20030520 [Fwd: 127 Research and Development: 127 Day!]",
              "refsource": "BUGTRAQ",
              "url": "http://www.securityfocus.com/archive/1/321997"
            },
            {
              "name": "20030329 sendmail 8.12.9 available",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
            },
            {
              "name": "VU#897604",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/897604"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0161",
    "datePublished": "2003-04-01T05:00:00",
    "dateReserved": "2003-03-24T00:00:00",
    "dateUpdated": "2024-08-08T01:43:36.017Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2004-1332
Vulnerability from cvelistv5
Published
2005-01-06 05:00
Modified
2024-08-08 00:46
Severity ?
Summary
Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request.
References
http://marc.info/?l=bugtraq&m=110797179710695&w=2vendor-advisory, x_refsource_HP
http://securitytracker.com/id?1012650vdb-entry, x_refsource_SECTRACK
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701vdb-entry, signature, x_refsource_OVAL
http://www.securityfocus.com/bid/12077vdb-entry, x_refsource_BID
http://marc.info/?l=bugtraq&m=110797179710695&w=2vendor-advisory, x_refsource_HP
http://www.kb.cert.org/vuls/id/647438third-party-advisory, x_refsource_CERT-VN
http://secunia.com/advisories/13608third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/18636vdb-entry, x_refsource_XF
http://www.idefense.com/application/poi/display?id=175&type=vulnerabilities&flashstatus=falsethird-party-advisory, x_refsource_IDEFENSE
Impacted products
Vendor Product Version
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:46:12.355Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "HPSBUX01118",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
          },
          {
            "name": "1012650",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1012650"
          },
          {
            "name": "oval:org.mitre.oval:def:5701",
            "tags": [
              "vdb-entry",
              "signature",
              "x_refsource_OVAL",
              "x_transferred"
            ],
            "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701"
          },
          {
            "name": "12077",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/12077"
          },
          {
            "name": "SSRT4883",
            "tags": [
              "vendor-advisory",
              "x_refsource_HP",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
          },
          {
            "name": "VU#647438",
            "tags": [
              "third-party-advisory",
              "x_refsource_CERT-VN",
              "x_transferred"
            ],
            "url": "http://www.kb.cert.org/vuls/id/647438"
          },
          {
            "name": "13608",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/13608"
          },
          {
            "name": "hp-ftpd-bo(18636)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18636"
          },
          {
            "name": "20041221 Hewlett Packard HP-UX ftpd Remote Buffer Overflow Vulnerability",
            "tags": [
              "third-party-advisory",
              "x_refsource_IDEFENSE",
              "x_transferred"
            ],
            "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities\u0026flashstatus=false"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-12-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-10-10T00:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "HPSBUX01118",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
        },
        {
          "name": "1012650",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1012650"
        },
        {
          "name": "oval:org.mitre.oval:def:5701",
          "tags": [
            "vdb-entry",
            "signature",
            "x_refsource_OVAL"
          ],
          "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701"
        },
        {
          "name": "12077",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/12077"
        },
        {
          "name": "SSRT4883",
          "tags": [
            "vendor-advisory",
            "x_refsource_HP"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
        },
        {
          "name": "VU#647438",
          "tags": [
            "third-party-advisory",
            "x_refsource_CERT-VN"
          ],
          "url": "http://www.kb.cert.org/vuls/id/647438"
        },
        {
          "name": "13608",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/13608"
        },
        {
          "name": "hp-ftpd-bo(18636)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18636"
        },
        {
          "name": "20041221 Hewlett Packard HP-UX ftpd Remote Buffer Overflow Vulnerability",
          "tags": [
            "third-party-advisory",
            "x_refsource_IDEFENSE"
          ],
          "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities\u0026flashstatus=false"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-1332",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "HPSBUX01118",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
            },
            {
              "name": "1012650",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1012650"
            },
            {
              "name": "oval:org.mitre.oval:def:5701",
              "refsource": "OVAL",
              "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701"
            },
            {
              "name": "12077",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/12077"
            },
            {
              "name": "SSRT4883",
              "refsource": "HP",
              "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
            },
            {
              "name": "VU#647438",
              "refsource": "CERT-VN",
              "url": "http://www.kb.cert.org/vuls/id/647438"
            },
            {
              "name": "13608",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/13608"
            },
            {
              "name": "hp-ftpd-bo(18636)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18636"
            },
            {
              "name": "20041221 Hewlett Packard HP-UX ftpd Remote Buffer Overflow Vulnerability",
              "refsource": "IDEFENSE",
              "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities\u0026flashstatus=false"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-1332",
    "datePublished": "2005-01-06T05:00:00",
    "dateReserved": "2005-01-06T00:00:00",
    "dateUpdated": "2024-08-08T00:46:12.355Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2004-12-31 05:00
Modified
2024-11-20 23:50
Severity ?
Summary
Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request.
References
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110797179710695&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=110797179710695&w=2
cve@mitre.orghttp://secunia.com/advisories/13608Patch
cve@mitre.orghttp://securitytracker.com/id?1012650
cve@mitre.orghttp://www.idefense.com/application/poi/display?id=175&type=vulnerabilities&flashstatus=false
cve@mitre.orghttp://www.kb.cert.org/vuls/id/647438Patch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.securityfocus.com/bid/12077Patch
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/18636
cve@mitre.orghttps://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110797179710695&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=110797179710695&w=2
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/13608Patch
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1012650
af854a3a-2127-422b-91ae-364da2661108http://www.idefense.com/application/poi/display?id=175&type=vulnerabilities&flashstatus=false
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/647438Patch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/12077Patch
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/18636
af854a3a-2127-422b-91ae-364da2661108https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701
Impacted products
Vendor Product Version
hp hp-ux 10.01
hp hp-ux 10.10
hp hp-ux 10.20
hp hp-ux 10.24
hp hp-ux 11.00
hp hp-ux 11.4
hp hp-ux 11.11
hp hp-ux 11.11i
hp hp-ux 11.22
hp hp-ux 11.23
hp hp-ux_series_700 10.20
hp hp-ux_series_800 10.20
hp sis *
hp vvos 10.24
hp vvos 11.04



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BBFE9A-6846-4625-91AC-47AA0BC0933A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "4259A901-A1CF-44EE-80C4-2031D3FCADC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "F038B325-A982-43FB-9146-E103CCFB5C41",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.11i:*:*:*:*:*:*:*",
              "matchCriteriaId": "C10245E1-C95C-4219-92C9-888E5966ABF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.23:*:*:*:*:*:*:*",
              "matchCriteriaId": "32310AFE-38CC-4C6C-AE13-54C18720F2C0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux_series_700:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B369244-5327-4946-9C49-AC93AE75866B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux_series_800:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A40F1951-2AC6-402E-95D6-19ECC3F695F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:sis:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC3AECB-D8A1-413E-BC9B-7245B386FCE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:vvos:10.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "D9B7C178-4BE6-4397-A4E2-01375E4CA978",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:vvos:11.04:*:*:*:*:*:*:*",
              "matchCriteriaId": "1D462D6F-EB68-4E31-87FD-D918F5DEF3FB",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Stack-based buffer overflow in the FTP daemon in HP-UX 11.11i, with the -v (debug) option enabled, allows remote attackers to execute arbitrary code via a long command request."
    }
  ],
  "id": "CVE-2004-1332",
  "lastModified": "2024-11-20T23:50:37.460",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-12-31T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/13608"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1012650"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities\u0026flashstatus=false"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/647438"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12077"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18636"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=110797179710695\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://secunia.com/advisories/13608"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1012650"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.idefense.com/application/poi/display?id=175\u0026type=vulnerabilities\u0026flashstatus=false"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/647438"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/12077"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/18636"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A5701"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2003-04-02 05:00
Modified
2024-11-20 23:44
Severity ?
Summary
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
References
cve@mitre.orgftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt
cve@mitre.orgftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc
cve@mitre.orgftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt
cve@mitre.orgftp://patches.sgi.com/support/free/security/advisories/20030401-01-P
cve@mitre.orghttp://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000614
cve@mitre.orghttp://lists.apple.com/mhonarc/security-announce/msg00028.html
cve@mitre.orghttp://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html
cve@mitre.orghttp://marc.info/?l=bugtraq&m=104896621106790&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=104897487512238&w=2
cve@mitre.orghttp://marc.info/?l=bugtraq&m=104914999806315&w=2
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1
cve@mitre.orghttp://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1
cve@mitre.orghttp://www.cert.org/advisories/CA-2003-12.htmlPatch, Third Party Advisory, US Government Resource
cve@mitre.orghttp://www.debian.org/security/2003/dsa-278
cve@mitre.orghttp://www.debian.org/security/2003/dsa-290
cve@mitre.orghttp://www.gentoo.org/security/en/glsa/glsa-200303-27.xml
cve@mitre.orghttp://www.kb.cert.org/vuls/id/897604US Government Resource
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-120.htmlPatch, Vendor Advisory
cve@mitre.orghttp://www.redhat.com/support/errata/RHSA-2003-121.html
cve@mitre.orghttp://www.securityfocus.com/archive/1/316961/30/25250/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/317135/30/25220/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/317135/30/25220/threaded
cve@mitre.orghttp://www.securityfocus.com/archive/1/321997
cve@mitre.orghttp://www.securityfocus.com/bid/7230Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc
af854a3a-2127-422b-91ae-364da2661108ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt
af854a3a-2127-422b-91ae-364da2661108ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P
af854a3a-2127-422b-91ae-364da2661108http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000614
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/mhonarc/security-announce/msg00028.html
af854a3a-2127-422b-91ae-364da2661108http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=104896621106790&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=104897487512238&w=2
af854a3a-2127-422b-91ae-364da2661108http://marc.info/?l=bugtraq&m=104914999806315&w=2
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1
af854a3a-2127-422b-91ae-364da2661108http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1
af854a3a-2127-422b-91ae-364da2661108http://www.cert.org/advisories/CA-2003-12.htmlPatch, Third Party Advisory, US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2003/dsa-278
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2003/dsa-290
af854a3a-2127-422b-91ae-364da2661108http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml
af854a3a-2127-422b-91ae-364da2661108http://www.kb.cert.org/vuls/id/897604US Government Resource
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-120.htmlPatch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://www.redhat.com/support/errata/RHSA-2003-121.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/316961/30/25250/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/317135/30/25220/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/317135/30/25220/threaded
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/archive/1/321997
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/7230Patch, Vendor Advisory
Impacted products
Vendor Product Version
sendmail sendmail 2.6
sendmail sendmail 2.6.1
sendmail sendmail 2.6.2
sendmail sendmail 3.0
sendmail sendmail 3.0.1
sendmail sendmail 3.0.2
sendmail sendmail 3.0.3
sendmail sendmail 8.9.0
sendmail sendmail 8.9.1
sendmail sendmail 8.9.2
sendmail sendmail 8.9.3
sendmail sendmail 8.10
sendmail sendmail 8.10.1
sendmail sendmail 8.10.2
sendmail sendmail 8.11.0
sendmail sendmail 8.11.1
sendmail sendmail 8.11.2
sendmail sendmail 8.11.3
sendmail sendmail 8.11.4
sendmail sendmail 8.11.5
sendmail sendmail 8.11.6
sendmail sendmail 8.12
sendmail sendmail 8.12
sendmail sendmail 8.12
sendmail sendmail 8.12
sendmail sendmail 8.12
sendmail sendmail 8.12.0
sendmail sendmail 8.12.1
sendmail sendmail 8.12.2
sendmail sendmail 8.12.3
sendmail sendmail 8.12.4
sendmail sendmail 8.12.5
sendmail sendmail 8.12.6
sendmail sendmail 8.12.7
sendmail sendmail 8.12.8
sendmail sendmail_switch 2.1
sendmail sendmail_switch 2.1.1
sendmail sendmail_switch 2.1.2
sendmail sendmail_switch 2.1.3
sendmail sendmail_switch 2.1.4
sendmail sendmail_switch 2.1.5
sendmail sendmail_switch 2.2
sendmail sendmail_switch 2.2.1
sendmail sendmail_switch 2.2.2
sendmail sendmail_switch 2.2.3
sendmail sendmail_switch 2.2.4
sendmail sendmail_switch 2.2.5
sendmail sendmail_switch 3.0
sendmail sendmail_switch 3.0.1
sendmail sendmail_switch 3.0.2
sendmail sendmail_switch 3.0.3
compaq tru64 4.0b
compaq tru64 4.0d
compaq tru64 4.0d_pk9_bl17
compaq tru64 4.0f
compaq tru64 4.0f_pk6_bl17
compaq tru64 4.0f_pk7_bl18
compaq tru64 4.0g
compaq tru64 4.0g_pk3_bl17
compaq tru64 5.0
compaq tru64 5.0_pk4_bl17
compaq tru64 5.0_pk4_bl18
compaq tru64 5.0a
compaq tru64 5.0a_pk3_bl17
compaq tru64 5.0f
compaq tru64 5.1
compaq tru64 5.1_pk3_bl17
compaq tru64 5.1_pk4_bl18
compaq tru64 5.1_pk5_bl19
compaq tru64 5.1_pk6_bl20
compaq tru64 5.1a
compaq tru64 5.1a_pk1_bl1
compaq tru64 5.1a_pk2_bl2
compaq tru64 5.1a_pk3_bl3
compaq tru64 5.1b
compaq tru64 5.1b_pk1_bl1
hp hp-ux 10.00
hp hp-ux 10.01
hp hp-ux 10.08
hp hp-ux 10.09
hp hp-ux 10.10
hp hp-ux 10.16
hp hp-ux 10.20
hp hp-ux 10.24
hp hp-ux 10.26
hp hp-ux 10.30
hp hp-ux 10.34
hp hp-ux 11.00
hp hp-ux 11.0.4
hp hp-ux 11.11
hp hp-ux 11.20
hp hp-ux 11.22
hp hp-ux_series_700 10.20
hp hp-ux_series_800 10.20
hp sis *
sun solaris 2.4
sun solaris 2.5
sun solaris 2.5.1
sun solaris 2.5.1
sun solaris 2.6
sun solaris 7.0
sun solaris 8.0
sun solaris 9.0
sun solaris 9.0
sun solaris 9.0
sun sunos -
sun sunos 5.4
sun sunos 5.5
sun sunos 5.5.1
sun sunos 5.7
sun sunos 5.8



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CA16C02-3B8D-4188-898E-048A93F11ADA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "0FF12CC4-C9CD-479A-8F85-8F947B5B60A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "623A2E07-2122-4ADE-9932-011DCA4396A3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "E5C563EF-FDED-4193-A66A-06527878BB1D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B4A267D3-2F49-4E61-B2C9-D8ED2265665E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7199205A-B914-40A1-9C82-A9698511E3C2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "BEC468AB-8B18-4169-8040-614A32444732",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "76A9602B-8E5A-4BF4-81F5-D1152D09FCAD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "EFD0B100-D822-4EBF-8EC9-ADAB8141116B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "196D77DF-E6D4-46D0-BC2C-8804A587CA25",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B743E5A3-6B15-4877-9424-A1F1A4214B73",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "76A60742-7815-4658-A6F7-147AA48C24B6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9A1A24F2-9C6B-4DF0-AB04-55D051812DD1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "120271B8-08A9-4C21-A108-0DA61095A006",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "84E6ECDA-DF65-47FF-A42F-FD5C1D864FA3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AA859AF-4E4E-4077-8E98-523E617A1DDC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A9791650-C367-43B6-A0F4-5BB56CE10778",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "8340DDA8-77DD-4AEB-B267-F86F64A851B3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "07DCBBEE-1DF0-40FE-B755-1FC35CF16788",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "581626E7-47B5-4819-B34F-B6DFD07A12F9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "8BBE9A4A-8AB9-4A97-A106-970FEB08952C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*",
              "matchCriteriaId": "BD99394C-5408-4A01-8D4E-417FFFFDE9C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*",
              "matchCriteriaId": "AAB59A24-87DE-4CAD-A2BA-AFCC0B2A55B2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*",
              "matchCriteriaId": "97D641EF-0B69-45A1-B85E-3C9C93AB9D42",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*",
              "matchCriteriaId": "8972211B-6A5B-4095-9CBB-CEF4C23C9C65",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*",
              "matchCriteriaId": "8F81A2AD-90A0-4B97-86A3-92690A0FCA71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "598F74BA-2B71-435E-92B8-9DEADB3311A5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "79A46DF2-8EEB-40C8-B1CA-01BC064BD25E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "581E5904-1A2B-49FF-BE3F-D42019AD816B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "B6CC4C83-4FB9-4344-AFCB-C260659F81DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "CAF763B4-58E3-4868-8C92-47DE3E4E5F40",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "8A4FCB77-7FAC-4A4B-851C-2F352B44D3CB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "6FEB3923-8F4B-4523-84F9-17D1CFA37F8C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "58CD19B4-4BFD-4DE8-B21F-6B6CDE6793C5",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "7B82BBB7-CD72-4A33-97D4-B1E51A595323",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "5492A89B-8140-4CF7-BE81-09C25A64373A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "B2A6D5AF-2134-4EC5-B53A-CE95B5505325",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "1B5FE819-E570-4AEE-BF0C-B9B1960A1AB8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "913AF73A-F6DE-4FAF-8A09-02CD33784B27",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "661A9B85-09EE-4D38-9160-8EEA6BE07BD7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "F28941D4-7D1E-4BF9-8E2F-C951978424E9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DD930C49-512B-4114-8A97-80B1816CFCFA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "7E8553E3-578B-4BE3-BBAD-5589338586E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "E7EE5C8E-8E2E-4C98-B8C5-B590E44B1EAC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "2A3930ED-DE49-4F01-A904-5D66E34832F4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "A3A51855-94DD-4F2E-BFF8-4ABE4613F962",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "56B76FFE-90CB-4C11-9E9D-FFA896482628",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "74C77927-A67A-4C1B-BB80-18148E1F0FE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "9C9D22E3-18F8-42F9-993E-81E832B0B125",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "7BABB5CA-26F4-4DB6-9D43-1C82751DCCA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F323395B-4549-4B54-8BBF-66B1B1B3F563",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:compaq:tru64:4.0b:*:*:*:*:*:*:*",
              "matchCriteriaId": "5E86C510-4F66-4B6B-BD11-E41E20ECAEEC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:4.0d:*:*:*:*:*:*:*",
              "matchCriteriaId": "B750254C-A460-4F52-B4A4-636CB2CBE50E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:4.0d_pk9_bl17:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF069023-0716-4806-9A04-1171770940B1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*",
              "matchCriteriaId": "AB2B5B59-B0CD-4F49-870B-F8F8BE902965",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*",
              "matchCriteriaId": "F9A4900F-7A0B-441E-967D-45B1A051A5B9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*",
              "matchCriteriaId": "F41B68A9-C4EF-47F5-BE84-BD20C073C2D2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*",
              "matchCriteriaId": "75546AD4-15DD-45FD-AFFB-8A59CB8D401C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*",
              "matchCriteriaId": "38B11F9E-64EE-47D1-A341-62F54382227C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3198FD9F-ACB8-4F59-A896-68A3A7287D78",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.0_pk4_bl17:*:*:*:*:*:*:*",
              "matchCriteriaId": "146562A0-D7AA-465D-9F48-5B0E75E4D109",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.0_pk4_bl18:*:*:*:*:*:*:*",
              "matchCriteriaId": "6BC279C2-31D2-4A13-B38B-593FA761361E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*",
              "matchCriteriaId": "5C85EF72-0F04-4705-9BED-C921F5FB7860",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.0a_pk3_bl17:*:*:*:*:*:*:*",
              "matchCriteriaId": "B86A9A68-DFD4-42FD-A11C-FCBC73E6EDCE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.0f:*:*:*:*:*:*:*",
              "matchCriteriaId": "9BE8BFB6-FE31-4C44-9562-76DC47E105B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "E296E409-EF32-48FC-88CB-C38C7CF4A239",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*",
              "matchCriteriaId": "BE0BEA96-837B-4699-BE2E-CCD8F8F3CF38",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*",
              "matchCriteriaId": "1E4DFD7B-4A10-4991-AC26-C8A957E87009",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*",
              "matchCriteriaId": "0EA62CD1-19EA-46D8-9423-BFFF9FC8CA3E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*",
              "matchCriteriaId": "881FCB3C-DAD8-4883-B185-19A61B76102B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*",
              "matchCriteriaId": "B9413090-D930-49DB-B7ED-7035C717B821",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*",
              "matchCriteriaId": "168C607C-6170-4936-9A53-AE3AAEBD79F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*",
              "matchCriteriaId": "A7793736-B551-428D-8A2F-291968E212FC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*",
              "matchCriteriaId": "3AB7AD47-5AF1-4CE0-A295-48567F991EAA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*",
              "matchCriteriaId": "55E0D6B2-C319-4DD4-AB4C-F2F35F7806F8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*",
              "matchCriteriaId": "CCEFCB5E-D7DF-48BF-B62A-081C4799F5A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "3187435B-C052-4DBA-AA79-F8AC0287EE14",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
              "matchCriteriaId": "53BBFE9A-6846-4625-91AC-47AA0BC0933A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*",
              "matchCriteriaId": "2170549C-80D2-4FF8-AC07-BD4124125B02",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*",
              "matchCriteriaId": "066D4E93-366F-42D4-B27D-8AF981F5F2AD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
              "matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*",
              "matchCriteriaId": "38E41C26-A086-4C9C-83D8-CB910F4B67F1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
              "matchCriteriaId": "4259A901-A1CF-44EE-80C4-2031D3FCADC3",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE98EAD2-838F-42A2-BC90-F739A6639D47",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
              "matchCriteriaId": "09070FE3-EF6B-41F6-89D8-3C9E31F3A6BF",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*",
              "matchCriteriaId": "CFD50216-90AC-480E-A11C-E88E64C6D84A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
              "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "3DB008E3-9A00-4D28-8826-A9FCC9F65314",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
              "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "6AB76FE0-BEF3-40D4-B362-0C95CA625A71",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
              "matchCriteriaId": "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux_series_700:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "8B369244-5327-4946-9C49-AC93AE75866B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:hp-ux_series_800:10.20:*:*:*:*:*:*:*",
              "matchCriteriaId": "A40F1951-2AC6-402E-95D6-19ECC3F695F2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:hp:sis:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "CDC3AECB-D8A1-413E-BC9B-7245B386FCE0",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
              "matchCriteriaId": "1F881110-7B54-49DA-B23A-710273430C44",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
              "matchCriteriaId": "200D8CB2-0D52-40A8-9CD9-6E4513605201",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*",
              "matchCriteriaId": "54AF87E4-52A4-44CA-B48E-A5BB139E6410",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
              "matchCriteriaId": "F66BAF35-A8B9-4E95-B270-444206FDD35B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "34EBF074-78C8-41AF-88F1-DA6726E56F8B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
              "matchCriteriaId": "8F1F312C-413F-4DB4-ABF4-48E33F6FECF2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
              "matchCriteriaId": "1894C542-AA81-40A9-BF47-AE24C93C1ACB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
              "matchCriteriaId": "A711CDC2-412C-499D-9FA6-7F25B06267C6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
              "matchCriteriaId": "0B837BB7-5F62-4CD5-9C64-8553C28EA8A7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*",
              "matchCriteriaId": "3F305CBD-4329-44DE-A85C-DE9FF371425E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
              "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "7AAC8954-74A8-4FE3-ABE7-57DA041D9D8F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
              "matchCriteriaId": "5B72953B-E873-4E44-A3CF-12D770A0D416",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "39F847DB-65A9-47DA-BCFA-A179E5E2301A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
              "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337."
    }
  ],
  "id": "CVE-2003-0161",
  "lastModified": "2024-11-20T23:44:07.030",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 10.0,
          "confidentialityImpact": "COMPLETE",
          "integrityImpact": "COMPLETE",
          "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 10.0,
        "obtainAllPrivilege": true,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-04-02T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc"
    },
    {
      "source": "cve@mitre.org",
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.cert.org/advisories/CA-2003-12.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2003/dsa-278"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2003/dsa-290"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/897604"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2003-120.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-121.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/archive/1/321997"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/7230"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Third Party Advisory",
        "US Government Resource"
      ],
      "url": "http://www.cert.org/advisories/CA-2003-12.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2003/dsa-278"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2003/dsa-290"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "US Government Resource"
      ],
      "url": "http://www.kb.cert.org/vuls/id/897604"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.redhat.com/support/errata/RHSA-2003-120.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.redhat.com/support/errata/RHSA-2003-121.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/archive/1/321997"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/7230"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

var-200304-0013
Vulnerability from variot

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. Sendmail contains a buffer overflow in code that parses email addresses. A remote attacker could execute arbitrary code or cause a denial of service on a vulnerable system. The flaw is present in the 'prescan()' procedure, which is used for processing email addresses in SMTP headers. This vulnerability stems from a logic error in the conversion of a char to an integer value. The issue has been fixed Sendmail 8.12.9. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. Sendmail is one of the most popular MTAs. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\% to 75\% of the total. Many UNIX and Linux workstations run Sendmail by default. This vulnerability exists in the prescan() process. The vulnerability is for messages, not connections. This means that the vulnerability is triggered by the content of a specially crafted email message, rather than by lower-level network communications. This is important because a non-vulnerable MTA can send malicious messages along with other protected MTAs in the network. In other words, even if the software used by the boundary MTA of the site is not sendmail, the sendmail service program with loopholes inside the network is still threatened. Messages that exploit this vulnerability can also pass through many common packet filters or firewalls undetected

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200304-0013",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.8,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "hp",
        "version": "10.24"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.01"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.10"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.34"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.0.4"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.30"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.11"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.6"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.26"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.16"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "11.20"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.5"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "7.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.3,
        "vendor": "sun",
        "version": "2.4"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "5.2"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "4.3"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 1.1,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk3_bl3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk6_bl17"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk2_bl2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0d_pk9_bl17"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk5_bl19"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0f"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f_pk7_bl18"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0f"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk4_bl18"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "11.00"
      },
      {
        "model": "hp-ux series 700",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b_pk1_bl1"
      },
      {
        "model": "sis",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "*"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0a"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0a_pk3_bl17"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.8"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "9.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g_pk3_bl17"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0_pk4_bl18"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "8.0"
      },
      {
        "model": "hp-ux series 800",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.5.1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.00"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0d"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.7"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a_pk1_bl1"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0g"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.08"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1b"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.0_pk4_bl17"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk6_bl20"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.0"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1_pk3_bl17"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "5.1a"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "sunos",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sun",
        "version": "5.4"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "hp",
        "version": "10.09"
      },
      {
        "model": "tru64",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "compaq",
        "version": "4.0b"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "sendmail",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "apple computer",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "conectiva",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "debian",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "freebsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "fujitsu",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "gentoo linux",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mandrakesoft",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "mirapoint",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "netbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "nortel",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openbsd",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "openpkg",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "red hat",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sco",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sgi",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sequent ibm",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "slackware",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "suse",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "the sendmail consortium",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wind river",
        "version": null
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "wirex",
        "version": null
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.11.6"
      },
      {
        "model": "sendmail",
        "scope": "lte",
        "trust": 0.8,
        "vendor": "sendmail consortium",
        "version": "8.12.8"
      },
      {
        "model": "cobalt raq4",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raq550",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "cobalt raqxtr",
        "scope": null,
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": null
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "2.6 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "2.6 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "7.0 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "8 (x86)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (sparc)"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sun microsystems",
        "version": "9 (x86)"
      },
      {
        "model": "advanced message server",
        "scope": null,
        "trust": 0.8,
        "vendor": "sendmail",
        "version": null
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.1.x"
      },
      {
        "model": "switch",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "sendmail",
        "version": "2.2.x"
      },
      {
        "model": "turbolinux advanced server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.1"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.5"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "6.0"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "7"
      },
      {
        "model": "turbolinux workstation",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "turbo linux",
        "version": "8"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.10"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "10.20"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.00"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.11"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.22"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "hewlett packard",
        "version": "11.04"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "6.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.1"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.2"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "7.3"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "8.0"
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "red hat",
        "version": "9"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "hp",
        "version": "11.04"
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.6,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "hp-ux sis",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20"
      },
      {
        "model": "z/os v1r4",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tru64 pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.16"
      },
      {
        "model": "os/390 v2r6",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "tru64 f pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.0"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.6"
      },
      {
        "model": "consortium sendmail beta10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "enterprise linux ws",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.2"
      },
      {
        "model": "tru64 pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "mac os",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "nonstop-ux whitney",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "hp-ux b.11.22",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.0"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.2"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.0"
      },
      {
        "model": "z/os",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.3"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.7"
      },
      {
        "model": "os/390 v2r9",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.5"
      },
      {
        "model": "solaris x86",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.2"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "7.5"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.3"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.9"
      },
      {
        "model": "hp-ux series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20700"
      },
      {
        "model": "advanced workstation for the itanium processor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "z/os v1r2",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "consortium sendmail beta5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.6"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.5"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.7"
      },
      {
        "model": "tru64 g pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 d pk9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail beta16",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "os/390 v2r8",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "solaris 2.6 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "hp-ux b.11.04",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "aix l",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "5.1"
      },
      {
        "model": "solaris 2.4 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "cobalt raq 4100r",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "550"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.11"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.4"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.8"
      },
      {
        "model": "tru64 d",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.8"
      },
      {
        "model": "tru64 g",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "solaris 8 sparc",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "nonstop-ux puma",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.2"
      },
      {
        "model": "solaris",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "9"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.18"
      },
      {
        "model": "enterprise linux es",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.8"
      },
      {
        "model": "tru64 f pk7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.9"
      },
      {
        "model": "openlinux server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "3.1.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.2"
      },
      {
        "model": "tru64 pk6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.4"
      },
      {
        "model": "solaris 8 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.5"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.2"
      },
      {
        "model": "cobalt qube3 4000wg",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.8"
      },
      {
        "model": "mac os server",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.5"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0.1"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.3"
      },
      {
        "model": "consortium sendmail beta12",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "os/390 v2r10",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.13"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.2"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.14"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.3"
      },
      {
        "model": "mpe/ix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "6.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.3"
      },
      {
        "model": "altavista firewall avfw98",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "tru64 b pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.4"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.9"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.7"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.1"
      },
      {
        "model": "solaris 2.5 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.4"
      },
      {
        "model": "openlinux workstation",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sco",
        "version": "3.1.1"
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "11.0"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5"
      },
      {
        "model": "internet express",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.4"
      },
      {
        "model": "consortium sendmail beta7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12"
      },
      {
        "model": "hp-ux b.11.11",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.5"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.2"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.1"
      },
      {
        "model": "tru64 a pk4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "5.1"
      },
      {
        "model": "tru64 a pk2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "3.0"
      },
      {
        "model": "hp-ux b.11.00",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.15"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.10"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.2.5"
      },
      {
        "model": "solaris 7.0 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "linux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "5.0"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.12.3"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.4"
      },
      {
        "model": "solaris 9 x86 update",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2"
      },
      {
        "model": "lx50",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "hp-ux",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.0"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.6"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.3"
      },
      {
        "model": "tru64 a",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "alphaserver sc",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      },
      {
        "model": "irix",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.20"
      },
      {
        "model": "tru64 pk5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "netbsd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "netbsd",
        "version": "1.5.1"
      },
      {
        "model": "tru64 f",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "4.0"
      },
      {
        "model": "inc sendmail switch",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.1.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.1"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.4"
      },
      {
        "model": "mac os server",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.2"
      },
      {
        "model": "tru64 b",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.12"
      },
      {
        "model": "solaris 9 x86",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.9.1"
      },
      {
        "model": "solaris ppc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sun",
        "version": "2.5.1"
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.11.2"
      },
      {
        "model": "hp-ux series",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "hp",
        "version": "10.20800"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6"
      },
      {
        "model": "inc sendmail for nt",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "2.6.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.17"
      },
      {
        "model": "mac os",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "apple",
        "version": "x10.2.3"
      },
      {
        "model": "tru64 a pk3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "compaq",
        "version": "5.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.19"
      },
      {
        "model": "aix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "4.3.1"
      },
      {
        "model": "irix",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sgi",
        "version": "6.5.2"
      },
      {
        "model": "mvs",
        "scope": null,
        "trust": 0.3,
        "vendor": "ibm",
        "version": null
      },
      {
        "model": "cobalt raq4 3001r",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "consortium sendmail",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "sendmail",
        "version": "8.10.1"
      },
      {
        "model": "enterprise linux as",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "redhat",
        "version": "2.1"
      },
      {
        "model": "cobalt raq xtr 3500r",
        "scope": null,
        "trust": 0.3,
        "vendor": "sun",
        "version": null
      },
      {
        "model": "altavista firewall raptor ec",
        "scope": null,
        "trust": 0.3,
        "vendor": "hp",
        "version": null
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          },
          {
            "children": [],
            "cpe_match": [
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0d:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0d_pk9_bl17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0_pk4_bl18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0b:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0_pk4_bl17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux_series_700:10.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux_series_800:10.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:sis:*:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0a_pk3_bl17:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.0f:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              },
              {
                "cpe23Uri": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*",
                "cpe_name": [],
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Michal Zalewski\u203b lcamtuf@dione.ids.pl",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2003-0161",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "acInsufInfo": false,
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "NVD",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "obtainAllPrivilege": true,
            "obtainOtherPrivilege": false,
            "obtainUserPrivilege": false,
            "severity": "HIGH",
            "trust": 1.0,
            "userInteractionRequired": false,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "acInsufInfo": null,
            "accessComplexity": "Low",
            "accessVector": "Network",
            "authentication": "None",
            "author": "NVD",
            "availabilityImpact": "Complete",
            "baseScore": 10.0,
            "confidentialityImpact": "Complete",
            "exploitabilityScore": null,
            "id": "CVE-2003-0161",
            "impactScore": null,
            "integrityImpact": "Complete",
            "obtainAllPrivilege": null,
            "obtainOtherPrivilege": null,
            "obtainUserPrivilege": null,
            "severity": "High",
            "trust": 0.9,
            "userInteractionRequired": null,
            "vectorString": "AV:N/AC:L/Au:N/C:C/I:C/A:C",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "COMPLETE",
            "baseScore": 10.0,
            "confidentialityImpact": "COMPLETE",
            "exploitabilityScore": 10.0,
            "id": "VHN-6991",
            "impactScore": 10.0,
            "integrityImpact": "COMPLETE",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:C/I:C/A:C",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "NVD",
            "id": "CVE-2003-0161",
            "trust": 1.8,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#897604",
            "trust": 0.8,
            "value": "67.20"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200304-025",
            "trust": 0.6,
            "value": "CRITICAL"
          },
          {
            "author": "VULHUB",
            "id": "VHN-6991",
            "trust": 0.1,
            "value": "HIGH"
          },
          {
            "author": "VULMON",
            "id": "CVE-2003-0161",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special \"NOCHAR\" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. Sendmail contains a buffer overflow in code that parses email addresses.  A remote attacker could execute arbitrary code or cause a denial of service on a vulnerable system. The flaw is present in the \u0027prescan()\u0027 procedure, which is used for processing email addresses in SMTP headers.  This vulnerability stems from a logic error in the conversion of a char to an integer value. The issue has been fixed Sendmail 8.12.9. Most organizations have various mail transfer agents (MTAs) at various locations within their network, at least one of which is directly connected to the Internet. Sendmail is one of the most popular MTAs. According to statistics, Internet mail traffic handled by Sendmail accounts for 50\\\\% to 75\\\\% of the total. Many UNIX and Linux workstations run Sendmail by default. This vulnerability exists in the prescan() process. The vulnerability is for messages, not connections. This means that the vulnerability is triggered by the content of a specially crafted email message, rather than by lower-level network communications. This is important because a non-vulnerable MTA can send malicious messages along with other protected MTAs in the network. In other words, even if the software used by the boundary MTA of the site is not sendmail, the sendmail service program with loopholes inside the network is still threatened. Messages that exploit this vulnerability can also pass through many common packet filters or firewalls undetected",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      },
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      }
    ],
    "trust": 2.79
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://vulmon.com/exploitdetails?qidtp=exploitdb\u0026qid=24",
        "trust": 0.2,
        "type": "exploit"
      },
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-6991",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#897604",
        "trust": 3.7
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161",
        "trust": 2.9
      },
      {
        "db": "BID",
        "id": "7230",
        "trust": 2.9
      },
      {
        "db": "XF",
        "id": "11653",
        "trust": 0.8
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025",
        "trust": 0.7
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:121",
        "trust": 0.6
      },
      {
        "db": "REDHAT",
        "id": "RHSA-2003:120",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-278",
        "trust": 0.6
      },
      {
        "db": "DEBIAN",
        "id": "DSA-290",
        "trust": 0.6
      },
      {
        "db": "SCO",
        "id": "SCOSA-2004.11",
        "trust": 0.6
      },
      {
        "db": "IMMUNIX",
        "id": "IMNX-2003-7+-002-01",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "52620",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "52700",
        "trust": 0.6
      },
      {
        "db": "SUNALERT",
        "id": "1001088",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030329 SENDMAIL 8.12.9 AVAILABLE",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030520 [FWD: 127 RESEARCH AND DEVELOPMENT: 127 DAY!]",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030331 GLSA: SENDMAIL (200303-27)",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030329 SENDMAIL: -1 GONE WILD",
        "trust": 0.6
      },
      {
        "db": "BUGTRAQ",
        "id": "20030330 [OPENPKG-SA-2003.027] OPENPKG SECURITY ADVISORY (SENDMAIL)",
        "trust": 0.6
      },
      {
        "db": "FULLDISC",
        "id": "20030329 SENDMAIL: -1 GONE WILD",
        "trust": 0.6
      },
      {
        "db": "CERT/CC",
        "id": "CA-2003-12",
        "trust": 0.6
      },
      {
        "db": "CONECTIVA",
        "id": "CLA-2003:614",
        "trust": 0.6
      },
      {
        "db": "SGI",
        "id": "20030401-01-P",
        "trust": 0.6
      },
      {
        "db": "CALDERA",
        "id": "CSSA-2003-016.0",
        "trust": 0.6
      },
      {
        "db": "GENTOO",
        "id": "GLSA-200303-27",
        "trust": 0.6
      },
      {
        "db": "FREEBSD",
        "id": "FREEBSD-SA-03:07",
        "trust": 0.6
      },
      {
        "db": "EXPLOIT-DB",
        "id": "24",
        "trust": 0.2
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-15232",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-62723",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-76244",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "22442",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991",
        "trust": 0.1
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ]
  },
  "id": "VAR-200304-0013",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2023-12-18T11:16:12.729000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "HPSBUX00253",
        "trust": 0.8,
        "url": "http://www1.itrc.hp.com/service/cki/docdisplay.do?docid=c00958571"
      },
      {
        "title": "HPSBUX0304-253",
        "trust": 0.8,
        "url": "http://h50221.www5.hp.com/upassist/itrc_japan/assist2/secbltn/hp-ux/hpsbux0304-253.html"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.ibm.com/jp/"
      },
      {
        "title": "RHSA-2003:120",
        "trust": 0.8,
        "url": "http://rhn.redhat.com/errata/rhsa-2003-120.html"
      },
      {
        "title": "sendmail 8.12.9 available",
        "trust": 0.8,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "title": "52620",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
      },
      {
        "title": "52700",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
      },
      {
        "title": "52700",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-3"
      },
      {
        "title": "52620",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-3"
      },
      {
        "title": "4 Sendmail Security Update 2.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq4.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "XTR Sendmail Security Update 1.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "550 Sendmail Security Update 0.0.1",
        "trust": 0.8,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raq550.eng\u0026amp;nav=patchpage"
      },
      {
        "title": "TLSA-2003-24",
        "trust": 0.8,
        "url": "http://www.turbolinux.com/security/2003/tlsa-2003-24.txt"
      },
      {
        "title": "Sendmail Inc. Information for VU#897604",
        "trust": 0.8,
        "url": "http://www.kb.cert.org/vuls/id/aamn-5kuutz"
      },
      {
        "title": "Top Page",
        "trust": 0.8,
        "url": "http://www.sendmail.co.jp/"
      },
      {
        "title": "RHSA-2003:120",
        "trust": 0.8,
        "url": "http://www.jp.redhat.com/support/errata/rhsa/rhsa-2003-120j.html"
      },
      {
        "title": "TLSA-2003-24",
        "trust": 0.8,
        "url": "http://www.turbolinux.co.jp/security/2003/tlsa-2003-24j.txt"
      },
      {
        "title": "Debian Security Advisories: DSA-290-1 sendmail-wide -- char-to-int conversion",
        "trust": 0.1,
        "url": "https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories\u0026qid=8086c3d7d3014252ce37b8626383010c"
      },
      {
        "title": "cumes",
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes "
      }
    ],
    "sources": [
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.0,
        "url": "http://www.kb.cert.org/vuls/id/897604"
      },
      {
        "trust": 2.7,
        "url": "http://www.securityfocus.com/bid/7230"
      },
      {
        "trust": 2.6,
        "url": "http://www.cert.org/advisories/ca-2003-12.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.securityfocus.com/archive/1/321997"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.caldera.com/pub/security/openlinux/cssa-2003-016.0.txt"
      },
      {
        "trust": 1.8,
        "url": "http://lists.apple.com/mhonarc/security-announce/msg00028.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2003/dsa-278"
      },
      {
        "trust": 1.8,
        "url": "http://www.debian.org/security/2003/dsa-290"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.freebsd.org/pub/freebsd/cert/advisories/freebsd-sa-03:07.sendmail.asc"
      },
      {
        "trust": 1.8,
        "url": "http://lists.grok.org.uk/pipermail/full-disclosure/2003-march/004295.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-120.html"
      },
      {
        "trust": 1.8,
        "url": "http://www.redhat.com/support/errata/rhsa-2003-121.html"
      },
      {
        "trust": 1.8,
        "url": "ftp://ftp.sco.com/pub/updates/openserver/scosa-2004.11/scosa-2004.11.txt"
      },
      {
        "trust": 1.8,
        "url": "ftp://patches.sgi.com/support/free/security/advisories/20030401-01-p"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1"
      },
      {
        "trust": 1.8,
        "url": "http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1"
      },
      {
        "trust": 1.7,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026anuncio=000614"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/316961/30/25250/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/317135/30/25220/threaded"
      },
      {
        "trust": 1.2,
        "url": "http://www.securityfocus.com/archive/1/archive/1/317135/30/25220/threaded"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104914999806315\u0026w=2"
      },
      {
        "trust": 1.1,
        "url": "http://marc.info/?l=bugtraq\u0026m=104897487512238\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://www.securityfocus.com/archive/1/316773/2003-03-28/2003-04-03/0"
      },
      {
        "trust": 0.8,
        "url": "http://www.iss.net/issen/delivery/xforce/alertdetail.jsp?oid=22127"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org/secure-install.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.sendmail.org/ftp/release_notes"
      },
      {
        "trust": 0.8,
        "url": "http://www.ietf.org/rfc/rfc2047.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.ciac.org/ciac/bulletins/n-067.shtml"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2003-0161"
      },
      {
        "trust": 0.8,
        "url": "http://www.ipa.go.jp/security/ciadr/20030331sendmail.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031401.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031501.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/wr/2003/wr031301.txt"
      },
      {
        "trust": 0.8,
        "url": "http://www.jpcert.or.jp/at/2003/at030004.txt"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-12"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/cert/jvnca-2003-07/index.html"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2003-0161"
      },
      {
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/xfdb/11653"
      },
      {
        "trust": 0.8,
        "url": "http://www.isskk.co.jp/support/techinfo/general/sendmail033103_xforce.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030330_153031.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.cyberpolice.go.jp/important/20030506_122656.html"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104897487512238\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://www.securityfocus.com/archive/1/archive/1/316961/30/25250/threaded"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104914999806315\u0026w=2"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=104896621106790\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f52620"
      },
      {
        "trust": 0.3,
        "url": "http://www.info.apple.com/usen/security/security_updates.html"
      },
      {
        "trust": 0.3,
        "url": "http://www-1.ibm.com/services/continuity/recover1.nsf/mss/mss-oar-e01-2003.0793.1"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/show.pl?target=cobalt/raqxtr.eng\u0026nav=patchpage"
      },
      {
        "trust": 0.3,
        "url": "http://rhn.redhat.com/errata/rhsa-2003-121.html"
      },
      {
        "trust": 0.3,
        "url": "http://www.sendmail.org/"
      },
      {
        "trust": 0.3,
        "url": "http://www.sotlinux.org/en/sotlinux/sa/2003/2003-0019.php"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v4.0f/duv40fb18-c0093400-17811-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1a/t64v51ab21-c0112900-17770-es-20030402.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1b/t64v51bb1-c0008000-17812-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v5.1/t64v51b20-c0176700-17773-es-20030402.readme"
      },
      {
        "trust": 0.3,
        "url": "http://ftp.support.compaq.com/patches/public/unix/v4.0g/t64v40gb17-c0029200-17810-es-20030403.readme"
      },
      {
        "trust": 0.3,
        "url": "http://sunsolve.sun.com/pub-cgi/retrieve.pl?doc=fsalert%2f52700\u0026zone_32=category%3asecurity"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/321997"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/316760"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104897487512238\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104896621106790\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=104914999806315\u0026amp;w=2"
      },
      {
        "trust": 0.1,
        "url": "http://distro.conectiva.com.br/atualizacoes/?id=a\u0026amp;anuncio=000614"
      },
      {
        "trust": 0.1,
        "url": ""
      },
      {
        "trust": 0.1,
        "url": "https://cwe.mitre.org/data/definitions/.html"
      },
      {
        "trust": 0.1,
        "url": "https://nvd.nist.gov"
      },
      {
        "trust": 0.1,
        "url": "https://www.debian.org/security/./dsa-290"
      },
      {
        "trust": 0.1,
        "url": "https://www.exploit-db.com/exploits/24/"
      },
      {
        "trust": 0.1,
        "url": "https://github.com/byte-mug/cumes"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "db": "NVD",
        "id": "CVE-2003-0161"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-03-29T00:00:00",
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "date": "2003-04-02T00:00:00",
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "date": "2003-04-02T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "date": "2003-03-29T00:00:00",
        "db": "BID",
        "id": "7230"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "date": "2003-04-02T05:00:00",
        "db": "NVD",
        "id": "CVE-2003-0161"
      },
      {
        "date": "2003-03-29T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2003-09-25T00:00:00",
        "db": "CERT/CC",
        "id": "VU#897604"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULHUB",
        "id": "VHN-6991"
      },
      {
        "date": "2018-10-30T00:00:00",
        "db": "VULMON",
        "id": "CVE-2003-0161"
      },
      {
        "date": "2007-09-21T23:40:00",
        "db": "BID",
        "id": "7230"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2003-000101"
      },
      {
        "date": "2018-10-30T16:26:22.763000",
        "db": "NVD",
        "id": "CVE-2003-0161"
      },
      {
        "date": "2010-02-14T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Sendmail address parsing buffer overflow",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#897604"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Boundary Condition Error",
    "sources": [
      {
        "db": "BID",
        "id": "7230"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200304-025"
      }
    ],
    "trust": 0.9
  }
}