Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2011-1720 (GCVE-0-2011-1720)
Vulnerability from cvelistv5 – Published: 2011-05-13 17:00 – Updated: 2024-08-06 22:37- n/a
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-06T22:37:25.642Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"name": "20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ",
"x_transferred"
],
"url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.postfix.org/CVE-2011-1720.html"
},
{
"name": "44500",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA",
"x_transferred"
],
"url": "http://secunia.com/advisories/44500"
},
{
"name": "47778",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/47778"
},
{
"name": "GLSA-201206-33",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO",
"x_transferred"
],
"url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
},
{
"name": "72259",
"tags": [
"vdb-entry",
"x_refsource_OSVDB",
"x_transferred"
],
"url": "http://www.osvdb.org/72259"
},
{
"name": "VU#727230",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN",
"x_transferred"
],
"url": "http://www.kb.cert.org/vuls/id/727230"
},
{
"name": "1025521",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK",
"x_transferred"
],
"url": "http://www.securitytracker.com/id?1025521"
},
{
"name": "[postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
"tags": [
"mailing-list",
"x_refsource_MLIST",
"x_transferred"
],
"url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
},
{
"name": "8247",
"tags": [
"third-party-advisory",
"x_refsource_SREASON",
"x_transferred"
],
"url": "http://securityreason.com/securityalert/8247"
},
{
"name": "SUSE-SA:2011:023",
"tags": [
"vendor-advisory",
"x_refsource_SUSE",
"x_transferred"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"name": "MDVSA-2011:090",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA",
"x_transferred"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
},
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "DSA-2233",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN",
"x_transferred"
],
"url": "http://www.debian.org/security/2011/dsa-2233"
},
{
"name": "USN-1131-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU",
"x_transferred"
],
"url": "http://www.ubuntu.com/usn/usn-1131-1"
},
{
"name": "postfix-cyrus-sasl-code-exec(67359)",
"tags": [
"vdb-entry",
"x_refsource_XF",
"x_transferred"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
}
],
"title": "CVE Program Container"
}
],
"cna": {
"affected": [
{
"product": "n/a",
"vendor": "n/a",
"versions": [
{
"status": "affected",
"version": "n/a"
}
]
}
],
"datePublic": "2011-05-09T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "n/a",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2018-10-09T18:57:01",
"orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"shortName": "mitre"
},
"references": [
{
"name": "20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
"tags": [
"mailing-list",
"x_refsource_BUGTRAQ"
],
"url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.postfix.org/CVE-2011-1720.html"
},
{
"name": "44500",
"tags": [
"third-party-advisory",
"x_refsource_SECUNIA"
],
"url": "http://secunia.com/advisories/44500"
},
{
"name": "47778",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/47778"
},
{
"name": "GLSA-201206-33",
"tags": [
"vendor-advisory",
"x_refsource_GENTOO"
],
"url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
},
{
"name": "72259",
"tags": [
"vdb-entry",
"x_refsource_OSVDB"
],
"url": "http://www.osvdb.org/72259"
},
{
"name": "VU#727230",
"tags": [
"third-party-advisory",
"x_refsource_CERT-VN"
],
"url": "http://www.kb.cert.org/vuls/id/727230"
},
{
"name": "1025521",
"tags": [
"vdb-entry",
"x_refsource_SECTRACK"
],
"url": "http://www.securitytracker.com/id?1025521"
},
{
"name": "[postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
"tags": [
"mailing-list",
"x_refsource_MLIST"
],
"url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
},
{
"name": "8247",
"tags": [
"third-party-advisory",
"x_refsource_SREASON"
],
"url": "http://securityreason.com/securityalert/8247"
},
{
"name": "SUSE-SA:2011:023",
"tags": [
"vendor-advisory",
"x_refsource_SUSE"
],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"name": "MDVSA-2011:090",
"tags": [
"vendor-advisory",
"x_refsource_MANDRIVA"
],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
},
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "DSA-2233",
"tags": [
"vendor-advisory",
"x_refsource_DEBIAN"
],
"url": "http://www.debian.org/security/2011/dsa-2233"
},
{
"name": "USN-1131-1",
"tags": [
"vendor-advisory",
"x_refsource_UBUNTU"
],
"url": "http://www.ubuntu.com/usn/usn-1131-1"
},
{
"name": "postfix-cyrus-sasl-code-exec(67359)",
"tags": [
"vdb-entry",
"x_refsource_XF"
],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-1720",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
},
{
"name": "http://www.postfix.org/CVE-2011-1720.html",
"refsource": "CONFIRM",
"url": "http://www.postfix.org/CVE-2011-1720.html"
},
{
"name": "44500",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44500"
},
{
"name": "47778",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47778"
},
{
"name": "GLSA-201206-33",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
},
{
"name": "72259",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/72259"
},
{
"name": "VU#727230",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/727230"
},
{
"name": "1025521",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025521"
},
{
"name": "[postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
"refsource": "MLIST",
"url": "http://www.mail-archive.com/postfix-announce@postfix.org/msg00007.html"
},
{
"name": "http://www.postfix.org/announcements/postfix-2.8.3.html",
"refsource": "CONFIRM",
"url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
},
{
"name": "8247",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8247"
},
{
"name": "SUSE-SA:2011:023",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=699035",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"name": "MDVSA-2011:090",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "DSA-2233",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2233"
},
{
"name": "USN-1131-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-1131-1"
},
{
"name": "postfix-cyrus-sasl-code-exec(67359)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
"assignerShortName": "mitre",
"cveId": "CVE-2011-1720",
"datePublished": "2011-05-13T17:00:00",
"dateReserved": "2011-04-18T00:00:00",
"dateUpdated": "2024-08-06T22:37:25.642Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DB5D16A3-59DA-407B-82E4-65C39EBD3710\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A7A4BE9-7CBE-404F-B577-933AC26E6E81\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"8872C496-2430-4EA6-B417-51C6877B874A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66B95D87-5B0B-48F6-8379-2521CFDE7CA9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A09799F5-6084-4F06-B851-4FEA7873BF35\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9230082E-FE88-4001-A614-43E8DD76471B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"258010A6-6B75-4663-AD5C-E7AD48B38DEE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"602E668A-1343-457B-B0E1-CAB3CCA05BD1\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"83C3C7F7-016F-458B-B40D-E06080552045\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FE51A934-BFD2-4E61-9827-A934995BDCAB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BDF57DB8-3D17-4868-9FDF-81A0645FBC5A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7D7ECFA4-01CF-4C44-949D-7781767B724A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A568A8FC-7BB0-431B-8BFE-1BF28DD545B2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B2273956-8CEB-439E-8841-953580AE673D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9E074865-92E2-4AFC-8542-00273FDFACEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1274628A-B6F8-48DA-A7B0-7629362A0383\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"123ED520-D9A9-457E-B0FF-2164678F2FDA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F03CC36-4E01-4298-8BF2-208EC2126E2D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DA763611-3C94-40EB-AC16-F6860FCBFDAC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E8725859-159E-49A5-91F2-12A6B300AE76\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D3B5347-F7FD-4291-8535-9D71F9F49568\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E2750F62-79D5-41ED-8624-4DC36A23A03D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C1D09CC9-07C8-42C7-B7B2-25251C8615A8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F28A5B6A-466B-4B24-9BD4-9DE15642A724\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C8E7B624-C991-4EA1-A977-6C06F57B4E2F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E899C1C0-18D1-43DE-BC55-C3C14F5395D2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"903BF741-FD7E-41F7-802D-88A09B7EFFFF\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7F0A444A-E6FE-4585-BA6C-6061A87C6144\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"161082B7-A757-496C-9D35-681851CEA10B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B02E2034-BB39-4B86-81CA-3BB93A4E4849\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"29CF0FA6-F4F6-4A4B-89A6-057F835FFE89\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0055B0EA-775F-4670-A3F9-C1676DBB97D5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"363704AE-66A9-4B58-A57E-47748F299471\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5226F933-9FB6-4BF6-AC3B-1A22D22F92F7\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0066AE84-D27D-4E9B-851B-40EDFD07C0BB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B739C7B-93CC-4367-B006-E8A721ECBCF2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F08A3C19-AEB6-4E0C-A41D-01024DC0A25D\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BAE8A81E-3856-4908-B7B7-9CF511CA2A21\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B935272-1EC7-4C70-8299-9DC7594809EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1647690F-D015-4DC4-9FB7-F5E9F0C430D9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A814997B-A612-493F-AA85-BA5A187A91FA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"449E9764-54F4-46F9-9E4D-F2C96EC5F37E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DF4A15A5-0994-4A3B-B4CD-1C5D9F411FDE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E3FB858-1B20-450B-9181-A1FE1C2B9DB4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C6BBD449-6F03-4EFE-8C87-B5014F0381F5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"DEBD42EA-B31E-4E37-BF28-FEBB18369A18\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B92BCC42-6E9F-44CB-A755-004B6DBD9D41\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B67A4AE-2C1C-49D6-9F53-05CAB51273E8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7A64D948-9441-492F-B9E5-DE5D5A3D7266\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6D7BCB67-AF9E-4343-827B-D783C71BAF46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"265AD494-E5EB-423B-9C20-62BCB1C3B9B5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B63D1C8C-6E55-43B1-9479-5CE7A917C501\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.16:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"208C73B6-88AF-4D8D-A7BE-8AB4E1A4F07B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.17:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"11993437-8CE2-44A7-BEF8-D5F7410DCB52\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.18:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E13F9414-C71A-49A7-9A84-BC3151E95598\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.3.19:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"546CC4D9-D2F4-4725-AD2D-200E6549BB63\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"998D1069-1CF5-42C5-8668-49D72E2D2F17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A2138A68-3F3D-4C7E-9FEB-2C8A445F2789\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"ED5E0EB5-ECC6-4573-9EA7-83E5741DA3CD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"790C02A8-95DD-42BE-8A1C-1C6D6DDCC443\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0A0034F2-585D-4A98-8428-996A726712DE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F8B162B5-DEF5-46AD-87D1-734B3B637D46\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0DF3730A-0FFD-4C23-B758-BBA67CC9CD92\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"10E8E5E2-5674-40D5-AD86-8C4DDB442EE6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"690EDC73-47B5-4891-86A5-37B6ED80E145\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"B751BA4B-B7C8-4A87-A03C-5C91678FC832\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"08943D31-2139-45D3-A0DB-0C11C31875CC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"591FB74F-BD86-4314-A359-739A245D2642\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F2EF7B2-943F-4DFA-8249-7FC0F9FB0312\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9B3AFC1E-01FF-4F91-8C82-5C16378812C0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.13:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"95E552B8-8B26-4DEE-BC6A-BC0B01C42474\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.14:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"66E26194-A7E6-4A99-8F55-7422A7E9BAB9\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.4.15:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58097735-FE3B-48B7-B5EA-3CD530E16031\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CA31260C-1C67-4E76-9F56-2359BFA0B197\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"A1DE90BD-B5F9-4762-B086-130AB04F3CB0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CCD5258B-C9DE-47BD-9172-27618F220201\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"BC95B8DD-C8C6-4FC4-81A5-23D7669DA22A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"894002C8-F3C1-4241-96FE-C088BBD0FCED\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C91BA7D1-2A5B-4721-8E13-6520D6F0114B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FBE79FBB-801F-4B1E-8FB8-CB2A1FAF6EEB\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"253DB571-62B7-4015-A758-9DE55AAB8B9E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F7AF9D8C-B11C-4681-84CE-5C86926C85F8\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"955FBDF4-5103-4B19-A5F1-9468F73C7A54\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.11:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"4AAC0FF5-9699-4011-8C07-5DDAF13B64A4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.5.12:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1262ECC9-7496-4D6B-880E-6CA85EE5CD46\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5D1E6461-2F2A-49C5-9B2B-08DE418F2F7B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"E5B3F710-13EF-4A36-B191-E0FCC1D98E23\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.6.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFB5988E-D04B-43B9-A980-82FD44D1D198\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.6.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"12A1021E-587D-47D3-80E8-43D9CCB4BD72\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.6.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"FAC9B923-222D-4F7F-970C-0B9ADF4E86F6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.6.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D31B75AE-FF82-4B70-BDEC-4B0FA791A085\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.6.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"C148A9D5-8899-4956-BE45-C4DBD4A2BE08\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.6.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"558A2B97-6582-445F-991C-4DD530E991DA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.6.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"56509587-6CE6-4497-B571-0A014E1FE064\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.6.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1B24CEB4-4F57-46CB-990B-AB664CEC96EE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.6.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5E40EEF8-F075-4B87-BDE7-C2D1A39B2F80\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.7.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D5044BFB-4F00-4FFC-9A66-2FDC666B6C2B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.7.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"827897F6-2A24-45EC-A072-8C02BA726069\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.7.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"9A3CFD6A-86E2-4E7B-BAC2-3163FC7DBF17\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.7.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7705A10C-0BA3-4F04-B757-5890B6A2A860\"}]}]}, {\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.8.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"133B8398-2495-47CD-B140-5247ECE86EE4\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.8.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D14612B0-7F74-4ED6-89F9-A11ED75A577F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:postfix:postfix:2.8.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F5C105E-B22B-48B4-8DC8-5B747792C102\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.\"}, {\"lang\": \"es\", \"value\": \"El servidor SMTP en Postfix anterior a v2.5.13, v2.6.x anterior a v2.6.10, v2.7.x anterior a v2.7.4, y v2.8.x anterior a v2.8.3, cuando ciertos m\\u00e9todos Cyrus SASL de autenticaci\\u00f3n son activados, no crea un nuevo manejador de servidor despu\\u00e9s de que la autentificaci\\u00f3n falle, lo que permite a atacantes remotos provocar una denegaci\\u00f3n de servicio (corrupci\\u00f3n de memoria libre y ca\\u00edda de demonio) o posiblemente ejecutar c\\u00f3digo de su elecci\\u00f3n a tra\\u00b4ves de un comando AUTH no v\\u00e1lido con un m\\u00e9todo seguido por un comando AUTH con un m\\u00e9todo diferente.\"}]",
"id": "CVE-2011-1720",
"lastModified": "2024-11-21T01:26:52.407",
"metrics": "{\"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:P/I:P/A:P\", \"baseScore\": 6.8, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"PARTIAL\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"PARTIAL\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 6.4, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": false}]}",
"published": "2011-05-13T17:05:43.207",
"references": "[{\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://secunia.com/advisories/44500\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201206-33.xml\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://securityreason.com/securityalert/8247\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.debian.org/security/2011/dsa-2233\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/727230\", \"source\": \"cve@mitre.org\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:090\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.osvdb.org/72259\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.postfix.org/CVE-2011-1720.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.postfix.org/announcements/postfix-2.8.3.html\", \"source\": \"cve@mitre.org\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/517917/100/0/threaded\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.securityfocus.com/bid/47778\", \"source\": \"cve@mitre.org\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1025521\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-1131-1\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=699035\", \"source\": \"cve@mitre.org\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/67359\", \"source\": \"cve@mitre.org\"}, {\"url\": \"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://secunia.com/advisories/44500\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://security.gentoo.org/glsa/glsa-201206-33.xml\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://securityreason.com/securityalert/8247\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.debian.org/security/2011/dsa-2233\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.kb.cert.org/vuls/id/727230\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"US Government Resource\"]}, {\"url\": \"http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.mandriva.com/security/advisories?name=MDVSA-2011:090\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.osvdb.org/72259\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.postfix.org/CVE-2011-1720.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.postfix.org/announcements/postfix-2.8.3.html\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/archive/1/517917/100/0/threaded\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.securityfocus.com/bid/47778\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Patch\"]}, {\"url\": \"http://www.securitytracker.com/id?1025521\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"http://www.ubuntu.com/usn/usn-1131-1\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://bugzilla.redhat.com/show_bug.cgi?id=699035\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}, {\"url\": \"https://exchange.xforce.ibmcloud.com/vulnerabilities/67359\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\"}]",
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-119\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2011-1720\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2011-05-13T17:05:43.207\",\"lastModified\":\"2025-04-11T00:51:21.963\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.\"},{\"lang\":\"es\",\"value\":\"El servidor SMTP en Postfix anterior a v2.5.13, v2.6.x anterior a v2.6.10, v2.7.x anterior a v2.7.4, y v2.8.x anterior a v2.8.3, cuando ciertos m\u00e9todos Cyrus SASL de autenticaci\u00f3n son activados, no crea un nuevo manejador de servidor despu\u00e9s de que la autentificaci\u00f3n falle, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria libre y ca\u00edda de demonio) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a tra\u00b4ves de un comando AUTH no v\u00e1lido con un m\u00e9todo seguido por un comando AUTH con un m\u00e9todo diferente.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:P/I:P/A:P\",\"baseScore\":6.8,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"PARTIAL\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"PARTIAL\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":6.4,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DB5D16A3-59DA-407B-82E4-65C39EBD3710\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A7A4BE9-7CBE-404F-B577-933AC26E6E81\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8872C496-2430-4EA6-B417-51C6877B874A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66B95D87-5B0B-48F6-8379-2521CFDE7CA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A09799F5-6084-4F06-B851-4FEA7873BF35\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9230082E-FE88-4001-A614-43E8DD76471B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"258010A6-6B75-4663-AD5C-E7AD48B38DEE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"602E668A-1343-457B-B0E1-CAB3CCA05BD1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"83C3C7F7-016F-458B-B40D-E06080552045\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE51A934-BFD2-4E61-9827-A934995BDCAB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BDF57DB8-3D17-4868-9FDF-81A0645FBC5A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7D7ECFA4-01CF-4C44-949D-7781767B724A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A568A8FC-7BB0-431B-8BFE-1BF28DD545B2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B2273956-8CEB-439E-8841-953580AE673D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9E074865-92E2-4AFC-8542-00273FDFACEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1274628A-B6F8-48DA-A7B0-7629362A0383\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"123ED520-D9A9-457E-B0FF-2164678F2FDA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F03CC36-4E01-4298-8BF2-208EC2126E2D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA763611-3C94-40EB-AC16-F6860FCBFDAC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E8725859-159E-49A5-91F2-12A6B300AE76\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D3B5347-F7FD-4291-8535-9D71F9F49568\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E2750F62-79D5-41ED-8624-4DC36A23A03D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C1D09CC9-07C8-42C7-B7B2-25251C8615A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F28A5B6A-466B-4B24-9BD4-9DE15642A724\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C8E7B624-C991-4EA1-A977-6C06F57B4E2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E899C1C0-18D1-43DE-BC55-C3C14F5395D2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"903BF741-FD7E-41F7-802D-88A09B7EFFFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F0A444A-E6FE-4585-BA6C-6061A87C6144\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"161082B7-A757-496C-9D35-681851CEA10B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B02E2034-BB39-4B86-81CA-3BB93A4E4849\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29CF0FA6-F4F6-4A4B-89A6-057F835FFE89\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0055B0EA-775F-4670-A3F9-C1676DBB97D5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"363704AE-66A9-4B58-A57E-47748F299471\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5226F933-9FB6-4BF6-AC3B-1A22D22F92F7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0066AE84-D27D-4E9B-851B-40EDFD07C0BB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B739C7B-93CC-4367-B006-E8A721ECBCF2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F08A3C19-AEB6-4E0C-A41D-01024DC0A25D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BAE8A81E-3856-4908-B7B7-9CF511CA2A21\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B935272-1EC7-4C70-8299-9DC7594809EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1647690F-D015-4DC4-9FB7-F5E9F0C430D9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A814997B-A612-493F-AA85-BA5A187A91FA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"449E9764-54F4-46F9-9E4D-F2C96EC5F37E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DF4A15A5-0994-4A3B-B4CD-1C5D9F411FDE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E3FB858-1B20-450B-9181-A1FE1C2B9DB4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C6BBD449-6F03-4EFE-8C87-B5014F0381F5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DEBD42EA-B31E-4E37-BF28-FEBB18369A18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B92BCC42-6E9F-44CB-A755-004B6DBD9D41\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B67A4AE-2C1C-49D6-9F53-05CAB51273E8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7A64D948-9441-492F-B9E5-DE5D5A3D7266\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6D7BCB67-AF9E-4343-827B-D783C71BAF46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"265AD494-E5EB-423B-9C20-62BCB1C3B9B5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B63D1C8C-6E55-43B1-9479-5CE7A917C501\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.16:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"208C73B6-88AF-4D8D-A7BE-8AB4E1A4F07B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.17:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11993437-8CE2-44A7-BEF8-D5F7410DCB52\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.18:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E13F9414-C71A-49A7-9A84-BC3151E95598\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.3.19:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"546CC4D9-D2F4-4725-AD2D-200E6549BB63\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"998D1069-1CF5-42C5-8668-49D72E2D2F17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A2138A68-3F3D-4C7E-9FEB-2C8A445F2789\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ED5E0EB5-ECC6-4573-9EA7-83E5741DA3CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"790C02A8-95DD-42BE-8A1C-1C6D6DDCC443\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0A0034F2-585D-4A98-8428-996A726712DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F8B162B5-DEF5-46AD-87D1-734B3B637D46\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0DF3730A-0FFD-4C23-B758-BBA67CC9CD92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"10E8E5E2-5674-40D5-AD86-8C4DDB442EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"690EDC73-47B5-4891-86A5-37B6ED80E145\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B751BA4B-B7C8-4A87-A03C-5C91678FC832\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08943D31-2139-45D3-A0DB-0C11C31875CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"591FB74F-BD86-4314-A359-739A245D2642\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F2EF7B2-943F-4DFA-8249-7FC0F9FB0312\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9B3AFC1E-01FF-4F91-8C82-5C16378812C0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.13:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"95E552B8-8B26-4DEE-BC6A-BC0B01C42474\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.14:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"66E26194-A7E6-4A99-8F55-7422A7E9BAB9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.4.15:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58097735-FE3B-48B7-B5EA-3CD530E16031\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CA31260C-1C67-4E76-9F56-2359BFA0B197\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A1DE90BD-B5F9-4762-B086-130AB04F3CB0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CCD5258B-C9DE-47BD-9172-27618F220201\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BC95B8DD-C8C6-4FC4-81A5-23D7669DA22A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"894002C8-F3C1-4241-96FE-C088BBD0FCED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C91BA7D1-2A5B-4721-8E13-6520D6F0114B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FBE79FBB-801F-4B1E-8FB8-CB2A1FAF6EEB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"253DB571-62B7-4015-A758-9DE55AAB8B9E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F7AF9D8C-B11C-4681-84CE-5C86926C85F8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"955FBDF4-5103-4B19-A5F1-9468F73C7A54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4AAC0FF5-9699-4011-8C07-5DDAF13B64A4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.5.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1262ECC9-7496-4D6B-880E-6CA85EE5CD46\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5D1E6461-2F2A-49C5-9B2B-08DE418F2F7B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5B3F710-13EF-4A36-B191-E0FCC1D98E23\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFB5988E-D04B-43B9-A980-82FD44D1D198\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"12A1021E-587D-47D3-80E8-43D9CCB4BD72\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FAC9B923-222D-4F7F-970C-0B9ADF4E86F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D31B75AE-FF82-4B70-BDEC-4B0FA791A085\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C148A9D5-8899-4956-BE45-C4DBD4A2BE08\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"558A2B97-6582-445F-991C-4DD530E991DA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"56509587-6CE6-4497-B571-0A014E1FE064\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1B24CEB4-4F57-46CB-990B-AB664CEC96EE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.6.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5E40EEF8-F075-4B87-BDE7-C2D1A39B2F80\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D5044BFB-4F00-4FFC-9A66-2FDC666B6C2B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.7.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"827897F6-2A24-45EC-A072-8C02BA726069\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9A3CFD6A-86E2-4E7B-BAC2-3163FC7DBF17\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7705A10C-0BA3-4F04-B757-5890B6A2A860\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.8.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"133B8398-2495-47CD-B140-5247ECE86EE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.8.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D14612B0-7F74-4ED6-89F9-A11ED75A577F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:postfix:postfix:2.8.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F5C105E-B22B-48B4-8DC8-5B747792C102\"}]}]}],\"references\":[{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/44500\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201206-33.xml\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://securityreason.com/securityalert/8247\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2233\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.kb.cert.org/vuls/id/727230\",\"source\":\"cve@mitre.org\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:090\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.osvdb.org/72259\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.postfix.org/CVE-2011-1720.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.postfix.org/announcements/postfix-2.8.3.html\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/517917/100/0/threaded\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/47778\",\"source\":\"cve@mitre.org\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1025521\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.ubuntu.com/usn/usn-1131-1\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=699035\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/67359\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/44500\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://security.gentoo.org/glsa/glsa-201206-33.xml\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://securityreason.com/securityalert/8247\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.debian.org/security/2011/dsa-2233\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.kb.cert.org/vuls/id/727230\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"US Government Resource\"]},{\"url\":\"http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.mandriva.com/security/advisories?name=MDVSA-2011:090\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.osvdb.org/72259\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.postfix.org/CVE-2011-1720.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.postfix.org/announcements/postfix-2.8.3.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/archive/1/517917/100/0/threaded\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/47778\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Patch\"]},{\"url\":\"http://www.securitytracker.com/id?1025521\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.ubuntu.com/usn/usn-1131-1\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://bugzilla.redhat.com/show_bug.cgi?id=699035\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/67359\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
}
}
CERTA-2011-AVI-283
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité dans Postfix permet à un utilisateur malveillant de provoquer un déni de service à distance.
La possibilité d'exécuter du code à distance n'est pas exclue.
Description
Lorsqu'un serveur SMTP Postfix utilise SASL, un défaut de gestion de l'authentification en fonction des connexions SMTP permet à un utilisateur malveillant de provoquer une corruption de la mémoire. Celle-ci provoque un arrêt inopiné du serveur. Il n'est pas exclu que l'attaquant puisse exécuter du code à distance avec les droits du compte système sous lequel le serveur SMTP s'exécute.
Solution
Les versions 2.5.13, 2.6.10, 2.7.4 et 2.8.3 du serveur SMTP Postfix corrigent ce problème.
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Postfix SMTP Server avec authentification SASL activée.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003ePostfix SMTP Server avec authentification SASL activ\u00e9e.\u003c/p\u003e",
"content": "## Description\n\nLorsqu\u0027un serveur SMTP Postfix utilise SASL, un d\u00e9faut de gestion de\nl\u0027authentification en fonction des connexions SMTP permet \u00e0 un\nutilisateur malveillant de provoquer une corruption de la m\u00e9moire.\nCelle-ci provoque un arr\u00eat inopin\u00e9 du serveur. Il n\u0027est pas exclu que\nl\u0027attaquant puisse ex\u00e9cuter du code \u00e0 distance avec les droits du compte\nsyst\u00e8me sous lequel le serveur SMTP s\u0027ex\u00e9cute.\n\n## Solution\n\nLes versions 2.5.13, 2.6.10, 2.7.4 et 2.8.3 du serveur SMTP Postfix\ncorrigent ce probl\u00e8me.\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Fedora FEDORA-2011-6777 du 17 mai 2011 (postfix-2.7.4-1.fc13) :",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060215.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Fedora FEDORA-2011-6771 du 17 mai 2011 (posftix-2.7.4-1.fc14) :",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060216.html"
}
],
"reference": "CERTA-2011-AVI-283",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-05-11T00:00:00.000000"
},
{
"description": "ajout des correctifs Fedora.",
"revision_date": "2011-05-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans Postfix permet \u00e0 un utilisateur malveillant de\nprovoquer un d\u00e9ni de service \u00e0 distance.\n\nLa possibilit\u00e9 d\u0027ex\u00e9cuter du code \u00e0 distance n\u0027est pas exclue.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Postfix",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Postfix CVE-2011-1720 du 08 mai 2011",
"url": "http://www.postfix.org/CVE-2011-1720.html"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTA-2011-AVI-283
Vulnerability from certfr_avis - Published: - Updated:
Une vulnérabilité dans Postfix permet à un utilisateur malveillant de provoquer un déni de service à distance.
La possibilité d'exécuter du code à distance n'est pas exclue.
Description
Lorsqu'un serveur SMTP Postfix utilise SASL, un défaut de gestion de l'authentification en fonction des connexions SMTP permet à un utilisateur malveillant de provoquer une corruption de la mémoire. Celle-ci provoque un arrêt inopiné du serveur. Il n'est pas exclu que l'attaquant puisse exécuter du code à distance avec les droits du compte système sous lequel le serveur SMTP s'exécute.
Solution
Les versions 2.5.13, 2.6.10, 2.7.4 et 2.8.3 du serveur SMTP Postfix corrigent ce problème.
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
Postfix SMTP Server avec authentification SASL activée.
| Vendor | Product | Description |
|---|
| Title | Publication Time | Tags | |
|---|---|---|---|
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [],
"affected_systems_content": "\u003cp\u003ePostfix SMTP Server avec authentification SASL activ\u00e9e.\u003c/p\u003e",
"content": "## Description\n\nLorsqu\u0027un serveur SMTP Postfix utilise SASL, un d\u00e9faut de gestion de\nl\u0027authentification en fonction des connexions SMTP permet \u00e0 un\nutilisateur malveillant de provoquer une corruption de la m\u00e9moire.\nCelle-ci provoque un arr\u00eat inopin\u00e9 du serveur. Il n\u0027est pas exclu que\nl\u0027attaquant puisse ex\u00e9cuter du code \u00e0 distance avec les droits du compte\nsyst\u00e8me sous lequel le serveur SMTP s\u0027ex\u00e9cute.\n\n## Solution\n\nLes versions 2.5.13, 2.6.10, 2.7.4 et 2.8.3 du serveur SMTP Postfix\ncorrigent ce probl\u00e8me.\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
}
],
"links": [
{
"title": "Bulletin de s\u00e9curit\u00e9 Fedora FEDORA-2011-6777 du 17 mai 2011 (postfix-2.7.4-1.fc13) :",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060215.html"
},
{
"title": "Bulletin de s\u00e9curit\u00e9 Fedora FEDORA-2011-6771 du 17 mai 2011 (posftix-2.7.4-1.fc14) :",
"url": "http://lists.fedoraproject.org/pipermail/package-announce/2011-May/060216.html"
}
],
"reference": "CERTA-2011-AVI-283",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2011-05-11T00:00:00.000000"
},
{
"description": "ajout des correctifs Fedora.",
"revision_date": "2011-05-19T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire \u00e0 distance"
}
],
"summary": "Une vuln\u00e9rabilit\u00e9 dans Postfix permet \u00e0 un utilisateur malveillant de\nprovoquer un d\u00e9ni de service \u00e0 distance.\n\nLa possibilit\u00e9 d\u0027ex\u00e9cuter du code \u00e0 distance n\u0027est pas exclue.\n",
"title": "Vuln\u00e9rabilit\u00e9 dans Postfix",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Postfix CVE-2011-1720 du 08 mai 2011",
"url": "http://www.postfix.org/CVE-2011-1720.html"
}
]
}
CERTFR-2015-AVI-431
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QFabric 3100 Director versions 12.x",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ScreenOS",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "CTPView 7.0R3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2905"
},
{
"name": "CVE-2011-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2483"
},
{
"name": "CVE-2013-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1667"
},
{
"name": "CVE-2012-3417",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3417"
},
{
"name": "CVE-2014-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0063"
},
{
"name": "CVE-2015-5600",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5600"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2014-8867",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8867"
},
{
"name": "CVE-2015-1793",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1793"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2009-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3490"
},
{
"name": "CVE-2012-0866",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0866"
},
{
"name": "CVE-2010-3433",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3433"
},
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2010-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1447"
},
{
"name": "CVE-2014-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0061"
},
{
"name": "CVE-2009-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0115"
},
{
"name": "CVE-2007-6067",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6067"
},
{
"name": "CVE-2010-0826",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0826"
},
{
"name": "CVE-2014-8159",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8159"
},
{
"name": "CVE-2010-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0211"
},
{
"name": "CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"name": "CVE-2015-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1158"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2010-4352",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4352"
},
{
"name": "CVE-2015-7749",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7749"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2010-1168",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1168"
},
{
"name": "CVE-2009-1189",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1189"
},
{
"name": "CVE-2014-6450",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6450"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2008-2937",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2937"
},
{
"name": "CVE-2012-2697",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2697"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2011-1081",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1081"
},
{
"name": "CVE-2009-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1632"
},
{
"name": "CVE-2012-3488",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3488"
},
{
"name": "CVE-2015-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5361"
},
{
"name": "CVE-2013-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6435"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2015-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1788"
},
{
"name": "CVE-2014-6449",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6449"
},
{
"name": "CVE-2015-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1792"
},
{
"name": "CVE-2014-6451",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6451"
},
{
"name": "CVE-2012-6329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6329"
},
{
"name": "CVE-2014-4345",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4345"
},
{
"name": "CVE-2008-5302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
},
{
"name": "CVE-2013-6629",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6629"
},
{
"name": "CVE-2014-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2285"
},
{
"name": "CVE-2013-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4449"
},
{
"name": "CVE-2012-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0868"
},
{
"name": "CVE-2007-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4476"
},
{
"name": "CVE-2010-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4410"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2015-7752",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7752"
},
{
"name": "CVE-2010-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0407"
},
{
"name": "CVE-2014-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0064"
},
{
"name": "CVE-2014-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0065"
},
{
"name": "CVE-2007-4772",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4772"
},
{
"name": "CVE-2013-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0292"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2008-5303",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
},
{
"name": "CVE-2015-1159",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1159"
},
{
"name": "CVE-2011-2200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2200"
},
{
"name": "CVE-2015-7748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7748"
},
{
"name": "CVE-2015-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7750"
},
{
"name": "CVE-2015-7751",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7751"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2008-3834",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3834"
},
{
"name": "CVE-2010-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0624"
},
{
"name": "CVE-2014-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0062"
},
{
"name": "CVE-2011-1025",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1025"
},
{
"name": "CVE-2014-6448",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6448"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
},
{
"name": "CVE-2010-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0212"
},
{
"name": "CVE-2009-1185",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1185"
},
{
"name": "CVE-2009-4901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4901"
},
{
"name": "CVE-2010-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1172"
},
{
"name": "CVE-2010-4530",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4530"
},
{
"name": "CVE-2011-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1024"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2014-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0060"
},
{
"name": "CVE-1999-0524",
"url": "https://www.cve.org/CVERecord?id=CVE-1999-0524"
},
{
"name": "CVE-2010-4015",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4015"
},
{
"name": "CVE-2011-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0002"
},
{
"name": "CVE-2009-1574",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1574"
},
{
"name": "CVE-2009-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3736"
},
{
"name": "CVE-2015-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1790"
},
{
"name": "CVE-2012-2143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2143"
},
{
"name": "CVE-2014-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0066"
},
{
"name": "CVE-2010-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0001"
}
],
"links": [],
"reference": "CERTFR-2015-AVI-431",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10694 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10700 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10700\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10703 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10703\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10708 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10708\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10705 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10706 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10706\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10695 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10695\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10699 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10697 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10697\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10707 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10707\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10702 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10702\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10704 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10704\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10696 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10696\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10701 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10701\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2015-AVI-431
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été corrigées dans les produits Juniper. Certaines d'entre elles permettent à un attaquant de provoquer une exécution de code arbitraire, un déni de service à distance et un contournement de la politique de sécurité.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Title | Publication Time | Tags | ||||||||||||||||||||||||||||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
|
||||||||||||||||||||||||||||||||||||||||||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "QFabric 3100 Director versions 12.x",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "ScreenOS",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "CTPView 7.0R3",
"product": {
"name": "N/A",
"vendor": {
"name": "N/A",
"scada": false
}
}
},
{
"description": "Juniper Junos OS",
"product": {
"name": "Junos OS",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2009-2905",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2905"
},
{
"name": "CVE-2011-2483",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2483"
},
{
"name": "CVE-2013-1667",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1667"
},
{
"name": "CVE-2012-3417",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3417"
},
{
"name": "CVE-2014-0063",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0063"
},
{
"name": "CVE-2015-5600",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5600"
},
{
"name": "CVE-2014-3566",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3566"
},
{
"name": "CVE-2014-8867",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8867"
},
{
"name": "CVE-2015-1793",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1793"
},
{
"name": "CVE-2015-1791",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1791"
},
{
"name": "CVE-2009-3490",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3490"
},
{
"name": "CVE-2012-0866",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0866"
},
{
"name": "CVE-2010-3433",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-3433"
},
{
"name": "CVE-2012-5526",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5526"
},
{
"name": "CVE-2010-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1447"
},
{
"name": "CVE-2014-0061",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0061"
},
{
"name": "CVE-2009-0115",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-0115"
},
{
"name": "CVE-2007-6067",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6067"
},
{
"name": "CVE-2010-0826",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0826"
},
{
"name": "CVE-2014-8159",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8159"
},
{
"name": "CVE-2010-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0211"
},
{
"name": "CVE-2013-4242",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4242"
},
{
"name": "CVE-2015-1158",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1158"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2010-4352",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4352"
},
{
"name": "CVE-2015-7749",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7749"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2010-1168",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1168"
},
{
"name": "CVE-2009-1189",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1189"
},
{
"name": "CVE-2014-6450",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6450"
},
{
"name": "CVE-2015-1789",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1789"
},
{
"name": "CVE-2008-2937",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2937"
},
{
"name": "CVE-2012-2697",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2697"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2011-1081",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1081"
},
{
"name": "CVE-2009-1632",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1632"
},
{
"name": "CVE-2012-3488",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-3488"
},
{
"name": "CVE-2015-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5361"
},
{
"name": "CVE-2013-6435",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6435"
},
{
"name": "CVE-2010-2761",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2761"
},
{
"name": "CVE-2012-5195",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5195"
},
{
"name": "CVE-2015-1788",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1788"
},
{
"name": "CVE-2014-6449",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6449"
},
{
"name": "CVE-2015-1792",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1792"
},
{
"name": "CVE-2014-6451",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6451"
},
{
"name": "CVE-2012-6329",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6329"
},
{
"name": "CVE-2014-4345",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4345"
},
{
"name": "CVE-2008-5302",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5302"
},
{
"name": "CVE-2013-6629",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6629"
},
{
"name": "CVE-2014-2285",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-2285"
},
{
"name": "CVE-2013-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4449"
},
{
"name": "CVE-2012-0868",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0868"
},
{
"name": "CVE-2007-4476",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4476"
},
{
"name": "CVE-2010-4410",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4410"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2015-7752",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7752"
},
{
"name": "CVE-2010-0407",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0407"
},
{
"name": "CVE-2014-0064",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0064"
},
{
"name": "CVE-2014-0065",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0065"
},
{
"name": "CVE-2007-4772",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-4772"
},
{
"name": "CVE-2013-0292",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0292"
},
{
"name": "CVE-2012-6151",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6151"
},
{
"name": "CVE-2008-5303",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5303"
},
{
"name": "CVE-2015-1159",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1159"
},
{
"name": "CVE-2011-2200",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2200"
},
{
"name": "CVE-2015-7748",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7748"
},
{
"name": "CVE-2015-7750",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7750"
},
{
"name": "CVE-2015-7751",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7751"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2008-3834",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3834"
},
{
"name": "CVE-2010-0624",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0624"
},
{
"name": "CVE-2014-0062",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0062"
},
{
"name": "CVE-2011-1025",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1025"
},
{
"name": "CVE-2014-6448",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6448"
},
{
"name": "CVE-2011-3597",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3597"
},
{
"name": "CVE-2010-0212",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0212"
},
{
"name": "CVE-2009-1185",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1185"
},
{
"name": "CVE-2009-4901",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-4901"
},
{
"name": "CVE-2010-1172",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-1172"
},
{
"name": "CVE-2010-4530",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4530"
},
{
"name": "CVE-2011-1024",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1024"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2014-0060",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0060"
},
{
"name": "CVE-1999-0524",
"url": "https://www.cve.org/CVERecord?id=CVE-1999-0524"
},
{
"name": "CVE-2010-4015",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4015"
},
{
"name": "CVE-2011-0002",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0002"
},
{
"name": "CVE-2009-1574",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-1574"
},
{
"name": "CVE-2009-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-3736"
},
{
"name": "CVE-2015-1790",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1790"
},
{
"name": "CVE-2012-2143",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2143"
},
{
"name": "CVE-2014-0066",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0066"
},
{
"name": "CVE-2010-0001",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-0001"
}
],
"links": [],
"reference": "CERTFR-2015-AVI-431",
"revisions": [
{
"description": "version initiale.",
"revision_date": "2015-10-15T00:00:00.000000"
}
],
"risks": [
{
"description": "D\u00e9ni de service \u00e0 distance"
},
{
"description": "Ex\u00e9cution de code arbitraire"
},
{
"description": "Injection de code indirecte \u00e0 distance"
},
{
"description": "Contournement de la politique de s\u00e9curit\u00e9"
},
{
"description": "\u00c9l\u00e9vation de privil\u00e8ges"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 corrig\u00e9es dans les produits \u003cspan\nclass=\"textit\"\u003eJuniper\u003c/span\u003e. Certaines d\u0027entre elles permettent \u00e0 un\nattaquant de provoquer une ex\u00e9cution de code arbitraire, un d\u00e9ni de\nservice \u00e0 distance et un contournement de la politique de s\u00e9curit\u00e9.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans les produits Juniper",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10694 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10694\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10700 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10700\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10703 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10703\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10708 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10708\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10705 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10706 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10706\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10695 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10695\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10699 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10699\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10697 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10697\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10707 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10707\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10702 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10702\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10704 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10704\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10696 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10696\u0026cat=SIRT_1\u0026actp=LIST"
},
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA10701 du 14 octobre 2015",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10701\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
CERTFR-2022-AVI-267
Vulnerability from certfr_avis - Published: - Updated:
De multiples vulnérabilités ont été découvertes dans Juniper Networks Junos Space. Elles permettent à un attaquant de provoquer un problème de sécurité non spécifié par l'éditeur.
Solution
Se référer au bulletin de sécurité de l'éditeur pour l'obtention des correctifs (cf. section Documentation).
None| Vendor | Product | Description | ||
|---|---|---|---|---|
| Juniper Networks | Junos Space | Juniper Networks Junos Space versions antérieures à 21.1R1 |
| Title | Publication Time | Tags | |||
|---|---|---|---|---|---|
|
|||||
{
"$ref": "https://www.cert.ssi.gouv.fr/openapi.json",
"affected_systems": [
{
"description": "Juniper Networks Junos Space versions ant\u00e9rieures \u00e0 21.1R1",
"product": {
"name": "Junos Space",
"vendor": {
"name": "Juniper Networks",
"scada": false
}
}
}
],
"affected_systems_content": null,
"content": "## Solution\n\nSe r\u00e9f\u00e9rer au bulletin de s\u00e9curit\u00e9 de l\u0027\u00e9diteur pour l\u0027obtention des\ncorrectifs (cf. section Documentation).\n",
"cves": [
{
"name": "CVE-2017-13078",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13078"
},
{
"name": "CVE-2017-13077",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13077"
},
{
"name": "CVE-2017-13080",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13080"
},
{
"name": "CVE-2017-13082",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13082"
},
{
"name": "CVE-2017-13088",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13088"
},
{
"name": "CVE-2017-13086",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13086"
},
{
"name": "CVE-2017-13087",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13087"
},
{
"name": "CVE-2017-5715",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5715"
},
{
"name": "CVE-2018-3639",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-3639"
},
{
"name": "CVE-2007-1351",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1351"
},
{
"name": "CVE-2007-1352",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-1352"
},
{
"name": "CVE-2007-6284",
"url": "https://www.cve.org/CVERecord?id=CVE-2007-6284"
},
{
"name": "CVE-2008-2935",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-2935"
},
{
"name": "CVE-2008-3281",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3281"
},
{
"name": "CVE-2008-3529",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-3529"
},
{
"name": "CVE-2008-4226",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4226"
},
{
"name": "CVE-2008-4225",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-4225"
},
{
"name": "CVE-2009-2414",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2414"
},
{
"name": "CVE-2009-2416",
"url": "https://www.cve.org/CVERecord?id=CVE-2009-2416"
},
{
"name": "CVE-2008-5161",
"url": "https://www.cve.org/CVERecord?id=CVE-2008-5161"
},
{
"name": "CVE-2010-4008",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-4008"
},
{
"name": "CVE-2011-0411",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0411"
},
{
"name": "CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"name": "CVE-2011-0216",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-0216"
},
{
"name": "CVE-2011-2834",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2834"
},
{
"name": "CVE-2011-2895",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2895"
},
{
"name": "CVE-2011-3905",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3905"
},
{
"name": "CVE-2011-3919",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3919"
},
{
"name": "CVE-2012-0841",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-0841"
},
{
"name": "CVE-2011-1944",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1944"
},
{
"name": "CVE-2012-2807",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2807"
},
{
"name": "CVE-2012-2870",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2870"
},
{
"name": "CVE-2012-5134",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-5134"
},
{
"name": "CVE-2011-3102",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-3102"
},
{
"name": "CVE-2013-2877",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2877"
},
{
"name": "CVE-2013-0338",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0338"
},
{
"name": "CVE-2012-6139",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-6139"
},
{
"name": "CVE-2013-2566",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2566"
},
{
"name": "CVE-2013-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6462"
},
{
"name": "CVE-2014-0211",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0211"
},
{
"name": "CVE-2014-3660",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3660"
},
{
"name": "CVE-2015-1803",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1803"
},
{
"name": "CVE-2015-1804",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1804"
},
{
"name": "CVE-2015-1802",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-1802"
},
{
"name": "CVE-2015-2716",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2716"
},
{
"name": "CVE-2015-5352",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5352"
},
{
"name": "CVE-2015-2808",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-2808"
},
{
"name": "CVE-2014-8991",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8991"
},
{
"name": "CVE-2014-7185",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7185"
},
{
"name": "CVE-2014-9365",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9365"
},
{
"name": "CVE-2015-6838",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6838"
},
{
"name": "CVE-2015-6837",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6837"
},
{
"name": "CVE-2015-7995",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7995"
},
{
"name": "CVE-2015-8035",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8035"
},
{
"name": "CVE-2015-7499",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7499"
},
{
"name": "CVE-2015-8242",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8242"
},
{
"name": "CVE-2015-7500",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7500"
},
{
"name": "CVE-2016-1762",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1762"
},
{
"name": "CVE-2015-5312",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5312"
},
{
"name": "CVE-2016-1839",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1839"
},
{
"name": "CVE-2016-1833",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1833"
},
{
"name": "CVE-2016-1837",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1837"
},
{
"name": "CVE-2016-1834",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1834"
},
{
"name": "CVE-2016-1840",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1840"
},
{
"name": "CVE-2016-1836",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1836"
},
{
"name": "CVE-2016-1838",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1838"
},
{
"name": "CVE-2016-1684",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1684"
},
{
"name": "CVE-2016-1683",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1683"
},
{
"name": "CVE-2016-4448",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4448"
},
{
"name": "CVE-2016-4447",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4447"
},
{
"name": "CVE-2016-4449",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4449"
},
{
"name": "CVE-2016-5131",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5131"
},
{
"name": "CVE-2015-0975",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0975"
},
{
"name": "CVE-2016-4658",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4658"
},
{
"name": "CVE-2016-2183",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2183"
},
{
"name": "CVE-2016-3627",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3627"
},
{
"name": "CVE-2016-3115",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3115"
},
{
"name": "CVE-2016-5636",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5636"
},
{
"name": "CVE-2017-7375",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7375"
},
{
"name": "CVE-2017-7376",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7376"
},
{
"name": "CVE-2017-7773",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7773"
},
{
"name": "CVE-2017-7772",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7772"
},
{
"name": "CVE-2017-7778",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7778"
},
{
"name": "CVE-2017-7771",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7771"
},
{
"name": "CVE-2017-7774",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7774"
},
{
"name": "CVE-2017-7776",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7776"
},
{
"name": "CVE-2017-7777",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7777"
},
{
"name": "CVE-2017-7775",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7775"
},
{
"name": "CVE-2017-6463",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6463"
},
{
"name": "CVE-2017-6462",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6462"
},
{
"name": "CVE-2017-6464",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6464"
},
{
"name": "CVE-2017-14492",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14492"
},
{
"name": "CVE-2017-14496",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14496"
},
{
"name": "CVE-2017-14491",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14491"
},
{
"name": "CVE-2017-14493",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14493"
},
{
"name": "CVE-2017-14494",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14494"
},
{
"name": "CVE-2017-14495",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14495"
},
{
"name": "CVE-2017-5130",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5130"
},
{
"name": "CVE-2017-3736",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3736"
},
{
"name": "CVE-2017-3735",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3735"
},
{
"name": "CVE-2017-15412",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15412"
},
{
"name": "CVE-2017-3738",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3738"
},
{
"name": "CVE-2017-3737",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-3737"
},
{
"name": "CVE-2017-17807",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17807"
},
{
"name": "CVE-2018-0739",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0739"
},
{
"name": "CVE-2017-16931",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16931"
},
{
"name": "CVE-2018-11214",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11214"
},
{
"name": "CVE-2015-9019",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9019"
},
{
"name": "CVE-2017-18258",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18258"
},
{
"name": "CVE-2017-16932",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16932"
},
{
"name": "CVE-2016-9318",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9318"
},
{
"name": "CVE-2018-1000120",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000120"
},
{
"name": "CVE-2018-1000007",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000007"
},
{
"name": "CVE-2018-1000121",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000121"
},
{
"name": "CVE-2018-1000122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000122"
},
{
"name": "CVE-2018-0732",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0732"
},
{
"name": "CVE-2018-6914",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-6914"
},
{
"name": "CVE-2017-0898",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0898"
},
{
"name": "CVE-2018-8778",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8778"
},
{
"name": "CVE-2017-14033",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14033"
},
{
"name": "CVE-2018-8780",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8780"
},
{
"name": "CVE-2017-17742",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17742"
},
{
"name": "CVE-2017-10784",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10784"
},
{
"name": "CVE-2017-17405",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17405"
},
{
"name": "CVE-2018-8779",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8779"
},
{
"name": "CVE-2017-14064",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14064"
},
{
"name": "CVE-2018-8777",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8777"
},
{
"name": "CVE-2018-16395",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16395"
},
{
"name": "CVE-2018-0737",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0737"
},
{
"name": "CVE-2018-16396",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16396"
},
{
"name": "CVE-2018-0495",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0495"
},
{
"name": "CVE-2018-0734",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0734"
},
{
"name": "CVE-2018-5407",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5407"
},
{
"name": "CVE-2018-1126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1126"
},
{
"name": "CVE-2018-7858",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7858"
},
{
"name": "CVE-2018-1124",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1124"
},
{
"name": "CVE-2018-10897",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10897"
},
{
"name": "CVE-2018-1064",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1064"
},
{
"name": "CVE-2018-5683",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5683"
},
{
"name": "CVE-2017-13672",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13672"
},
{
"name": "CVE-2018-11212",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11212"
},
{
"name": "CVE-2017-18267",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18267"
},
{
"name": "CVE-2018-13988",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13988"
},
{
"name": "CVE-2018-20169",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20169"
},
{
"name": "CVE-2018-19985",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19985"
},
{
"name": "CVE-2019-1559",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1559"
},
{
"name": "CVE-2019-6133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6133"
},
{
"name": "CVE-2018-18311",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18311"
},
{
"name": "CVE-2018-12127",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12127"
},
{
"name": "CVE-2018-12130",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12130"
},
{
"name": "CVE-2019-11091",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11091"
},
{
"name": "CVE-2018-12126",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12126"
},
{
"name": "CVE-2019-9503",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9503"
},
{
"name": "CVE-2019-10132",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10132"
},
{
"name": "CVE-2019-11190",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11190"
},
{
"name": "CVE-2019-11884",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11884"
},
{
"name": "CVE-2019-11487",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11487"
},
{
"name": "CVE-2019-12382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12382"
},
{
"name": "CVE-2018-7191",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7191"
},
{
"name": "CVE-2019-5953",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5953"
},
{
"name": "CVE-2019-12614",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12614"
},
{
"name": "CVE-2019-11729",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11729"
},
{
"name": "CVE-2019-11727",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11727"
},
{
"name": "CVE-2019-11719",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11719"
},
{
"name": "CVE-2018-1060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1060"
},
{
"name": "CVE-2018-12327",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12327"
},
{
"name": "CVE-2018-1061",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1061"
},
{
"name": "CVE-2019-10639",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10639"
},
{
"name": "CVE-2019-10638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10638"
},
{
"name": "CVE-2018-20836",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20836"
},
{
"name": "CVE-2019-13233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13233"
},
{
"name": "CVE-2019-14283",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14283"
},
{
"name": "CVE-2019-13648",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13648"
},
{
"name": "CVE-2019-10207",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10207"
},
{
"name": "CVE-2015-9289",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9289"
},
{
"name": "CVE-2019-14816",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14816"
},
{
"name": "CVE-2019-15239",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15239"
},
{
"name": "CVE-2019-15917",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15917"
},
{
"name": "CVE-2017-18551",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18551"
},
{
"name": "CVE-2019-15217",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15217"
},
{
"name": "CVE-2019-14821",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14821"
},
{
"name": "CVE-2019-11068",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11068"
},
{
"name": "CVE-2018-18066",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18066"
},
{
"name": "CVE-2019-15903",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15903"
},
{
"name": "CVE-2019-17666",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17666"
},
{
"name": "CVE-2019-17133",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17133"
},
{
"name": "CVE-2018-12207",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12207"
},
{
"name": "CVE-2019-11135",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11135"
},
{
"name": "CVE-2019-0154",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0154"
},
{
"name": "CVE-2019-17055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17055"
},
{
"name": "CVE-2019-17053",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17053"
},
{
"name": "CVE-2019-16746",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16746"
},
{
"name": "CVE-2019-0155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-0155"
},
{
"name": "CVE-2019-16233",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16233"
},
{
"name": "CVE-2019-15807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15807"
},
{
"name": "CVE-2019-16231",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16231"
},
{
"name": "CVE-2019-11756",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11756"
},
{
"name": "CVE-2019-11745",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11745"
},
{
"name": "CVE-2019-19058",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19058"
},
{
"name": "CVE-2019-14895",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14895"
},
{
"name": "CVE-2019-19046",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19046"
},
{
"name": "CVE-2019-15916",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-15916"
},
{
"name": "CVE-2019-18660",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18660"
},
{
"name": "CVE-2019-19063",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19063"
},
{
"name": "CVE-2019-19062",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19062"
},
{
"name": "CVE-2018-14526",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14526"
},
{
"name": "CVE-2019-13734",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13734"
},
{
"name": "CVE-2019-19530",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19530"
},
{
"name": "CVE-2019-19534",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19534"
},
{
"name": "CVE-2019-19524",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19524"
},
{
"name": "CVE-2019-14901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14901"
},
{
"name": "CVE-2019-19537",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19537"
},
{
"name": "CVE-2019-19523",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19523"
},
{
"name": "CVE-2019-19338",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19338"
},
{
"name": "CVE-2019-19332",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19332"
},
{
"name": "CVE-2019-19527",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19527"
},
{
"name": "CVE-2019-18808",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18808"
},
{
"name": "CVE-2019-19767",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19767"
},
{
"name": "CVE-2019-19807",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19807"
},
{
"name": "CVE-2019-19055",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19055"
},
{
"name": "CVE-2019-17023",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17023"
},
{
"name": "CVE-2019-9824",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9824"
},
{
"name": "CVE-2019-9636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9636"
},
{
"name": "CVE-2019-12749",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12749"
},
{
"name": "CVE-2019-19447",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19447"
},
{
"name": "CVE-2019-20095",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20095"
},
{
"name": "CVE-2019-20054",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20054"
},
{
"name": "CVE-2019-18634",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18634"
},
{
"name": "CVE-2019-14898",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14898"
},
{
"name": "CVE-2019-16994",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16994"
},
{
"name": "CVE-2019-18282",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-18282"
},
{
"name": "CVE-2020-2732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-2732"
},
{
"name": "CVE-2019-19059",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-19059"
},
{
"name": "CVE-2019-3901",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3901"
},
{
"name": "CVE-2020-9383",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-9383"
},
{
"name": "CVE-2020-8647",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8647"
},
{
"name": "CVE-2020-8649",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-8649"
},
{
"name": "CVE-2020-1749",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1749"
},
{
"name": "CVE-2019-9458",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9458"
},
{
"name": "CVE-2020-10942",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10942"
},
{
"name": "CVE-2019-9454",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9454"
},
{
"name": "CVE-2020-11565",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11565"
},
{
"name": "CVE-2020-10690",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10690"
},
{
"name": "CVE-2020-10751",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10751"
},
{
"name": "CVE-2020-12826",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12826"
},
{
"name": "CVE-2020-12654",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12654"
},
{
"name": "CVE-2020-10732",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10732"
},
{
"name": "CVE-2019-20636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20636"
},
{
"name": "CVE-2019-20811",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20811"
},
{
"name": "CVE-2020-12653",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12653"
},
{
"name": "CVE-2020-10757",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10757"
},
{
"name": "CVE-2020-12770",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12770"
},
{
"name": "CVE-2020-12888",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12888"
},
{
"name": "CVE-2020-12402",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12402"
},
{
"name": "CVE-2018-16881",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16881"
},
{
"name": "CVE-2018-19519",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19519"
},
{
"name": "CVE-2020-10713",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10713"
},
{
"name": "CVE-2020-14311",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14311"
},
{
"name": "CVE-2020-14309",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14309"
},
{
"name": "CVE-2020-15706",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15706"
},
{
"name": "CVE-2020-14308",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14308"
},
{
"name": "CVE-2020-14310",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14310"
},
{
"name": "CVE-2020-15705",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15705"
},
{
"name": "CVE-2020-15707",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15707"
},
{
"name": "CVE-2020-14331",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14331"
},
{
"name": "CVE-2020-10769",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10769"
},
{
"name": "CVE-2020-14364",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14364"
},
{
"name": "CVE-2020-12400",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12400"
},
{
"name": "CVE-2020-12401",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12401"
},
{
"name": "CVE-2020-6829",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-6829"
},
{
"name": "CVE-2020-14314",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14314"
},
{
"name": "CVE-2020-24394",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-24394"
},
{
"name": "CVE-2020-25212",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25212"
},
{
"name": "CVE-2020-14305",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14305"
},
{
"name": "CVE-2020-10742",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10742"
},
{
"name": "CVE-2020-14385",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14385"
},
{
"name": "CVE-2020-25643",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25643"
},
{
"name": "CVE-2020-15999",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-15999"
},
{
"name": "CVE-2018-20843",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20843"
},
{
"name": "CVE-2018-5729",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5729"
},
{
"name": "CVE-2018-5730",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-5730"
},
{
"name": "CVE-2020-13817",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-13817"
},
{
"name": "CVE-2020-11868",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-11868"
},
{
"name": "CVE-2021-3156",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3156"
},
{
"name": "CVE-2019-17006",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17006"
},
{
"name": "CVE-2019-13232",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13232"
},
{
"name": "CVE-2020-10531",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10531"
},
{
"name": "CVE-2019-8696",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8696"
},
{
"name": "CVE-2019-20907",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20907"
},
{
"name": "CVE-2019-8675",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8675"
},
{
"name": "CVE-2017-12652",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-12652"
},
{
"name": "CVE-2019-12450",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12450"
},
{
"name": "CVE-2020-12825",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12825"
},
{
"name": "CVE-2020-12243",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12243"
},
{
"name": "CVE-2019-14866",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14866"
},
{
"name": "CVE-2020-1983",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-1983"
},
{
"name": "CVE-2019-5188",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5188"
},
{
"name": "CVE-2019-5094",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5094"
},
{
"name": "CVE-2020-10754",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10754"
},
{
"name": "CVE-2020-12049",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12049"
},
{
"name": "CVE-2019-14822",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14822"
},
{
"name": "CVE-2020-14363",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-14363"
},
{
"name": "CVE-2019-9924",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9924"
},
{
"name": "CVE-2018-18751",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18751"
},
{
"name": "CVE-2019-9948",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9948"
},
{
"name": "CVE-2019-20386",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20386"
},
{
"name": "CVE-2017-13722",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13722"
},
{
"name": "CVE-2014-0210",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0210"
},
{
"name": "CVE-2018-16403",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16403"
},
{
"name": "CVE-2018-15746",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15746"
},
{
"name": "CVE-2014-6272",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-6272"
},
{
"name": "CVE-2019-7638",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7638"
},
{
"name": "CVE-2015-8241",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8241"
},
{
"name": "CVE-2019-10155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10155"
},
{
"name": "CVE-2018-11813",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11813"
},
{
"name": "CVE-2018-18310",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18310"
},
{
"name": "CVE-2018-1084",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1084"
},
{
"name": "CVE-2020-12662",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12662"
},
{
"name": "CVE-2012-4423",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-4423"
},
{
"name": "CVE-2017-0902",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0902"
},
{
"name": "CVE-2018-8945",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-8945"
},
{
"name": "CVE-2017-0899",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0899"
},
{
"name": "CVE-2010-2239",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2239"
},
{
"name": "CVE-2010-2242",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2242"
},
{
"name": "CVE-2017-14167",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-14167"
},
{
"name": "CVE-2015-0225",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0225"
},
{
"name": "CVE-2019-11324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11324"
},
{
"name": "CVE-2013-6458",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6458"
},
{
"name": "CVE-2018-1000075",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000075"
},
{
"name": "CVE-2018-15857",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15857"
},
{
"name": "CVE-2018-16062",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16062"
},
{
"name": "CVE-2018-10534",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10534"
},
{
"name": "CVE-2014-0179",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0179"
},
{
"name": "CVE-2018-18384",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18384"
},
{
"name": "CVE-2013-1766",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-1766"
},
{
"name": "CVE-2016-6580",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6580"
},
{
"name": "CVE-2018-12697",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12697"
},
{
"name": "CVE-2018-1000301",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000301"
},
{
"name": "CVE-2019-11236",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-11236"
},
{
"name": "CVE-2019-12155",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12155"
},
{
"name": "CVE-2017-0900",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0900"
},
{
"name": "CVE-2014-3598",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3598"
},
{
"name": "CVE-2017-1000050",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000050"
},
{
"name": "CVE-2018-10535",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10535"
},
{
"name": "CVE-2019-3820",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3820"
},
{
"name": "CVE-2018-16402",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-16402"
},
{
"name": "CVE-2018-1116",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1116"
},
{
"name": "CVE-2018-15853",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15853"
},
{
"name": "CVE-2019-14378",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14378"
},
{
"name": "CVE-2016-1494",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1494"
},
{
"name": "CVE-2019-12312",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12312"
},
{
"name": "CVE-2013-0339",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-0339"
},
{
"name": "CVE-2019-16935",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16935"
},
{
"name": "CVE-2015-6525",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-6525"
},
{
"name": "CVE-2016-6581",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-6581"
},
{
"name": "CVE-2013-4520",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4520"
},
{
"name": "CVE-2014-3633",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3633"
},
{
"name": "CVE-2014-3004",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3004"
},
{
"name": "CVE-2015-9381",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9381"
},
{
"name": "CVE-2016-5361",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5361"
},
{
"name": "CVE-2018-14598",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14598"
},
{
"name": "CVE-2014-1447",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-1447"
},
{
"name": "CVE-2018-20852",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20852"
},
{
"name": "CVE-2012-2693",
"url": "https://www.cve.org/CVERecord?id=CVE-2012-2693"
},
{
"name": "CVE-2018-7208",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7208"
},
{
"name": "CVE-2018-12910",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12910"
},
{
"name": "CVE-2019-8325",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8325"
},
{
"name": "CVE-2015-7497",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7497"
},
{
"name": "CVE-2019-7665",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7665"
},
{
"name": "CVE-2018-15854",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15854"
},
{
"name": "CVE-2019-13404",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-13404"
},
{
"name": "CVE-2015-5160",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5160"
},
{
"name": "CVE-2018-10767",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10767"
},
{
"name": "CVE-2018-7550",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7550"
},
{
"name": "CVE-2016-3076",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3076"
},
{
"name": "CVE-2018-14404",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14404"
},
{
"name": "CVE-2018-18521",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18521"
},
{
"name": "CVE-2018-19788",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-19788"
},
{
"name": "CVE-2019-8322",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8322"
},
{
"name": "CVE-2019-3840",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3840"
},
{
"name": "CVE-2016-9189",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9189"
},
{
"name": "CVE-2015-9262",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9262"
},
{
"name": "CVE-2018-14647",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14647"
},
{
"name": "CVE-2019-17041",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17041"
},
{
"name": "CVE-2019-14906",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14906"
},
{
"name": "CVE-2018-1000073",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000073"
},
{
"name": "CVE-2019-9947",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9947"
},
{
"name": "CVE-2017-1000158",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-1000158"
},
{
"name": "CVE-2019-7635",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7635"
},
{
"name": "CVE-2019-7576",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7576"
},
{
"name": "CVE-2019-14834",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14834"
},
{
"name": "CVE-2018-15855",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15855"
},
{
"name": "CVE-2019-7149",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7149"
},
{
"name": "CVE-2018-7642",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7642"
},
{
"name": "CVE-2019-5010",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-5010"
},
{
"name": "CVE-2018-12641",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-12641"
},
{
"name": "CVE-2021-3396",
"url": "https://www.cve.org/CVERecord?id=CVE-2021-3396"
},
{
"name": "CVE-2020-12403",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12403"
},
{
"name": "CVE-2017-15268",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15268"
},
{
"name": "CVE-2018-15587",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15587"
},
{
"name": "CVE-2016-10746",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-10746"
},
{
"name": "CVE-2017-13711",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13711"
},
{
"name": "CVE-2014-8131",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-8131"
},
{
"name": "CVE-2014-9601",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-9601"
},
{
"name": "CVE-2014-3657",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3657"
},
{
"name": "CVE-2018-10373",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10373"
},
{
"name": "CVE-2017-17790",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17790"
},
{
"name": "CVE-2011-2511",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-2511"
},
{
"name": "CVE-2018-1000802",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000802"
},
{
"name": "CVE-2017-7555",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7555"
},
{
"name": "CVE-2016-9015",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9015"
},
{
"name": "CVE-2017-13720",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13720"
},
{
"name": "CVE-2018-11782",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11782"
},
{
"name": "CVE-2017-11671",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11671"
},
{
"name": "CVE-2017-10664",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-10664"
},
{
"name": "CVE-2018-11213",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11213"
},
{
"name": "CVE-2013-6457",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-6457"
},
{
"name": "CVE-2019-10138",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10138"
},
{
"name": "CVE-2019-7578",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7578"
},
{
"name": "CVE-2020-7039",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-7039"
},
{
"name": "CVE-2017-11368",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-11368"
},
{
"name": "CVE-2018-0494",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-0494"
},
{
"name": "CVE-2019-20485",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20485"
},
{
"name": "CVE-2003-1418",
"url": "https://www.cve.org/CVERecord?id=CVE-2003-1418"
},
{
"name": "CVE-2017-15289",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15289"
},
{
"name": "CVE-2016-5391",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5391"
},
{
"name": "CVE-2017-2810",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-2810"
},
{
"name": "CVE-2018-15864",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15864"
},
{
"name": "CVE-2017-18207",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18207"
},
{
"name": "CVE-2019-12761",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12761"
},
{
"name": "CVE-2013-5651",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-5651"
},
{
"name": "CVE-2017-17522",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-17522"
},
{
"name": "CVE-2019-20382",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-20382"
},
{
"name": "CVE-2016-2533",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-2533"
},
{
"name": "CVE-2019-14287",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-14287"
},
{
"name": "CVE-2018-18520",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-18520"
},
{
"name": "CVE-2019-9740",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-9740"
},
{
"name": "CVE-2019-7575",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7575"
},
{
"name": "CVE-2015-5652",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-5652"
},
{
"name": "CVE-2019-7572",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7572"
},
{
"name": "CVE-2017-6519",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-6519"
},
{
"name": "CVE-2018-10906",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10906"
},
{
"name": "CVE-2018-15863",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15863"
},
{
"name": "CVE-2018-15862",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15862"
},
{
"name": "CVE-2018-1000079",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000079"
},
{
"name": "CVE-2019-7664",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7664"
},
{
"name": "CVE-2017-5992",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-5992"
},
{
"name": "CVE-2019-16865",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16865"
},
{
"name": "CVE-2019-8324",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8324"
},
{
"name": "CVE-2018-1000076",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000076"
},
{
"name": "CVE-2018-1000030",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000030"
},
{
"name": "CVE-2018-1000074",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000074"
},
{
"name": "CVE-2017-0901",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0901"
},
{
"name": "CVE-2018-7568",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7568"
},
{
"name": "CVE-2016-0775",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0775"
},
{
"name": "CVE-2018-15688",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15688"
},
{
"name": "CVE-2018-14599",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14599"
},
{
"name": "CVE-2018-10733",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10733"
},
{
"name": "CVE-2016-9396",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9396"
},
{
"name": "CVE-2019-10160",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-10160"
},
{
"name": "CVE-2017-7562",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-7562"
},
{
"name": "CVE-2016-1000032",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-1000032"
},
{
"name": "CVE-2017-15124",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-15124"
},
{
"name": "CVE-2018-1113",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1113"
},
{
"name": "CVE-2013-4399",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4399"
},
{
"name": "CVE-2019-7636",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7636"
},
{
"name": "CVE-2014-3672",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3672"
},
{
"name": "CVE-2018-4700",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4700"
},
{
"name": "CVE-2017-0903",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-0903"
},
{
"name": "CVE-2018-15856",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15856"
},
{
"name": "CVE-2018-1000078",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000078"
},
{
"name": "CVE-2019-7573",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7573"
},
{
"name": "CVE-2018-1000077",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000077"
},
{
"name": "CVE-2010-2237",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2237"
},
{
"name": "CVE-2018-1000876",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000876"
},
{
"name": "CVE-2018-14348",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14348"
},
{
"name": "CVE-2019-3890",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-3890"
},
{
"name": "CVE-2015-7498",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-7498"
},
{
"name": "CVE-2019-7577",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7577"
},
{
"name": "CVE-2016-0740",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0740"
},
{
"name": "CVE-2018-4180",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4180"
},
{
"name": "CVE-2013-4297",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4297"
},
{
"name": "CVE-2010-2238",
"url": "https://www.cve.org/CVERecord?id=CVE-2010-2238"
},
{
"name": "CVE-2018-14600",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14600"
},
{
"name": "CVE-2017-13090",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13090"
},
{
"name": "CVE-2013-7336",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-7336"
},
{
"name": "CVE-2018-10372",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10372"
},
{
"name": "CVE-2019-7637",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7637"
},
{
"name": "CVE-2018-11806",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-11806"
},
{
"name": "CVE-2018-7643",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7643"
},
{
"name": "CVE-2015-0236",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-0236"
},
{
"name": "CVE-2018-1000117",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1000117"
},
{
"name": "CVE-2014-0209",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-0209"
},
{
"name": "CVE-2013-2230",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-2230"
},
{
"name": "CVE-2018-1122",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-1122"
},
{
"name": "CVE-2014-3960",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-3960"
},
{
"name": "CVE-2019-16056",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-16056"
},
{
"name": "CVE-2020-12663",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-12663"
},
{
"name": "CVE-2018-10768",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10768"
},
{
"name": "CVE-2017-16611",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-16611"
},
{
"name": "CVE-2014-7823",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-7823"
},
{
"name": "CVE-2020-10703",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10703"
},
{
"name": "CVE-2018-7569",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-7569"
},
{
"name": "CVE-2013-4154",
"url": "https://www.cve.org/CVERecord?id=CVE-2013-4154"
},
{
"name": "CVE-2018-20060",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-20060"
},
{
"name": "CVE-2015-9382",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-9382"
},
{
"name": "CVE-2017-18190",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-18190"
},
{
"name": "CVE-2016-4009",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-4009"
},
{
"name": "CVE-2018-13033",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-13033"
},
{
"name": "CVE-2016-9190",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-9190"
},
{
"name": "CVE-2019-7574",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7574"
},
{
"name": "CVE-2016-0772",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-0772"
},
{
"name": "CVE-2016-5699",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5699"
},
{
"name": "CVE-2011-1486",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1486"
},
{
"name": "CVE-2020-5208",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-5208"
},
{
"name": "CVE-2019-6778",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6778"
},
{
"name": "CVE-2020-10772",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-10772"
},
{
"name": "CVE-2020-25637",
"url": "https://www.cve.org/CVERecord?id=CVE-2020-25637"
},
{
"name": "CVE-2018-10360",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-10360"
},
{
"name": "CVE-2018-15859",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15859"
},
{
"name": "CVE-2017-13089",
"url": "https://www.cve.org/CVERecord?id=CVE-2017-13089"
},
{
"name": "CVE-2019-12779",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-12779"
},
{
"name": "CVE-2019-1010238",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-1010238"
},
{
"name": "CVE-2019-6690",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-6690"
},
{
"name": "CVE-2015-8317",
"url": "https://www.cve.org/CVERecord?id=CVE-2015-8317"
},
{
"name": "CVE-2018-4181",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-4181"
},
{
"name": "CVE-2019-8323",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-8323"
},
{
"name": "CVE-2016-3616",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-3616"
},
{
"name": "CVE-2018-14498",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-14498"
},
{
"name": "CVE-2018-15861",
"url": "https://www.cve.org/CVERecord?id=CVE-2018-15861"
},
{
"name": "CVE-2019-7150",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-7150"
},
{
"name": "CVE-2019-17042",
"url": "https://www.cve.org/CVERecord?id=CVE-2019-17042"
},
{
"name": "CVE-2016-5008",
"url": "https://www.cve.org/CVERecord?id=CVE-2016-5008"
},
{
"name": "CVE-2014-4616",
"url": "https://www.cve.org/CVERecord?id=CVE-2014-4616"
}
],
"links": [],
"reference": "CERTFR-2022-AVI-267",
"revisions": [
{
"description": "Version initiale",
"revision_date": "2022-03-23T00:00:00.000000"
}
],
"risks": [
{
"description": "Non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur"
}
],
"summary": "De multiples vuln\u00e9rabilit\u00e9s ont \u00e9t\u00e9 d\u00e9couvertes dans Juniper Networks\nJunos Space. Elles permettent \u00e0 un attaquant de provoquer un probl\u00e8me de\ns\u00e9curit\u00e9 non sp\u00e9cifi\u00e9 par l\u0027\u00e9diteur.\n",
"title": "Multiples vuln\u00e9rabilit\u00e9s dans Juniper Networks Junos Space",
"vendor_advisories": [
{
"published_at": null,
"title": "Bulletin de s\u00e9curit\u00e9 Juniper JSA11176 du 22 mars 2022",
"url": "https://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA11176\u0026cat=SIRT_1\u0026actp=LIST"
}
]
}
GHSA-8J5R-6HHW-HF9G
Vulnerability from github – Published: 2022-05-14 02:55 – Updated: 2025-04-11 03:46The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.
{
"affected": [],
"aliases": [
"CVE-2011-1720"
],
"database_specific": {
"cwe_ids": [
"CWE-119"
],
"github_reviewed": false,
"github_reviewed_at": null,
"nvd_published_at": "2011-05-13T17:05:00Z",
"severity": "MODERATE"
},
"details": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.",
"id": "GHSA-8j5r-6hhw-hf9g",
"modified": "2025-04-11T03:46:54Z",
"published": "2022-05-14T02:55:23Z",
"references": [
{
"type": "ADVISORY",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1720"
},
{
"type": "WEB",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"type": "WEB",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
},
{
"type": "WEB",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"type": "WEB",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
},
{
"type": "WEB",
"url": "http://secunia.com/advisories/44500"
},
{
"type": "WEB",
"url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
},
{
"type": "WEB",
"url": "http://securityreason.com/securityalert/8247"
},
{
"type": "WEB",
"url": "http://www.debian.org/security/2011/dsa-2233"
},
{
"type": "WEB",
"url": "http://www.kb.cert.org/vuls/id/727230"
},
{
"type": "WEB",
"url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"
},
{
"type": "WEB",
"url": "http://www.mail-archive.com/postfix-announce@postfix.org/msg00007.html"
},
{
"type": "WEB",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
},
{
"type": "WEB",
"url": "http://www.osvdb.org/72259"
},
{
"type": "WEB",
"url": "http://www.postfix.org/CVE-2011-1720.html"
},
{
"type": "WEB",
"url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
},
{
"type": "WEB",
"url": "http://www.securityfocus.com/bid/47778"
},
{
"type": "WEB",
"url": "http://www.securitytracker.com/id?1025521"
},
{
"type": "WEB",
"url": "http://www.ubuntu.com/usn/usn-1131-1"
}
],
"schema_version": "1.4.0",
"severity": []
}
GSD-2011-1720
Vulnerability from gsd - Updated: 2023-12-13 01:19{
"GSD": {
"alias": "CVE-2011-1720",
"description": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.",
"id": "GSD-2011-1720",
"references": [
"https://www.suse.com/security/cve/CVE-2011-1720.html",
"https://www.debian.org/security/2011/dsa-2233",
"https://access.redhat.com/errata/RHSA-2011:0843",
"https://linux.oracle.com/cve/CVE-2011-1720.html"
]
},
"gsd": {
"metadata": {
"exploitCode": "unknown",
"remediation": "unknown",
"reportConfidence": "confirmed",
"type": "vulnerability"
},
"osvSchema": {
"aliases": [
"CVE-2011-1720"
],
"details": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.",
"id": "GSD-2011-1720",
"modified": "2023-12-13T01:19:08.679291Z",
"schema_version": "1.4.0"
}
},
"namespaces": {
"cve.org": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-1720",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "n/a",
"version": {
"version_data": [
{
"version_value": "n/a"
}
]
}
}
]
},
"vendor_name": "n/a"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "n/a"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
"refsource": "BUGTRAQ",
"url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
},
{
"name": "http://www.postfix.org/CVE-2011-1720.html",
"refsource": "CONFIRM",
"url": "http://www.postfix.org/CVE-2011-1720.html"
},
{
"name": "44500",
"refsource": "SECUNIA",
"url": "http://secunia.com/advisories/44500"
},
{
"name": "47778",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/47778"
},
{
"name": "GLSA-201206-33",
"refsource": "GENTOO",
"url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
},
{
"name": "72259",
"refsource": "OSVDB",
"url": "http://www.osvdb.org/72259"
},
{
"name": "VU#727230",
"refsource": "CERT-VN",
"url": "http://www.kb.cert.org/vuls/id/727230"
},
{
"name": "1025521",
"refsource": "SECTRACK",
"url": "http://www.securitytracker.com/id?1025521"
},
{
"name": "[postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
"refsource": "MLIST",
"url": "http://www.mail-archive.com/postfix-announce@postfix.org/msg00007.html"
},
{
"name": "http://www.postfix.org/announcements/postfix-2.8.3.html",
"refsource": "CONFIRM",
"url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
},
{
"name": "8247",
"refsource": "SREASON",
"url": "http://securityreason.com/securityalert/8247"
},
{
"name": "SUSE-SA:2011:023",
"refsource": "SUSE",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=699035",
"refsource": "CONFIRM",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"name": "MDVSA-2011:090",
"refsource": "MANDRIVA",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "CONFIRM",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "DSA-2233",
"refsource": "DEBIAN",
"url": "http://www.debian.org/security/2011/dsa-2233"
},
{
"name": "USN-1131-1",
"refsource": "UBUNTU",
"url": "http://www.ubuntu.com/usn/usn-1131-1"
},
{
"name": "postfix-cyrus-sasl-code-exec(67359)",
"refsource": "XF",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
}
]
}
},
"nvd.nist.gov": {
"configurations": {
"CVE_data_version": "4.0",
"nodes": [
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.15:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.13:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.10:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.4.12:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.18:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.19:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.14:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.3.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.5.11:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.6.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.6.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.6.9:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.6.5:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.6.6:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.6.7:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.6.8:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.6.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.6.4:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.7.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.7.3:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.7.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.7.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
},
{
"children": [],
"cpe_match": [
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.8.2:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.8.0:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
},
{
"cpe23Uri": "cpe:2.3:a:postfix:postfix:2.8.1:*:*:*:*:*:*:*",
"cpe_name": [],
"vulnerable": true
}
],
"operator": "OR"
}
]
},
"cve": {
"CVE_data_meta": {
"ASSIGNER": "cve@mitre.org",
"ID": "CVE-2011-1720"
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "en",
"value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "VU#727230",
"refsource": "CERT-VN",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/727230"
},
{
"name": "http://www.postfix.org/announcements/postfix-2.8.3.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
},
{
"name": "https://bugzilla.redhat.com/show_bug.cgi?id=699035",
"refsource": "CONFIRM",
"tags": [],
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"name": "[postfix-announce] 20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
"refsource": "MLIST",
"tags": [],
"url": "http://www.mail-archive.com/postfix-announce@postfix.org/msg00007.html"
},
{
"name": "44500",
"refsource": "SECUNIA",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44500"
},
{
"name": "72259",
"refsource": "OSVDB",
"tags": [],
"url": "http://www.osvdb.org/72259"
},
{
"name": "USN-1131-1",
"refsource": "UBUNTU",
"tags": [],
"url": "http://www.ubuntu.com/usn/usn-1131-1"
},
{
"name": "http://www.postfix.org/CVE-2011-1720.html",
"refsource": "CONFIRM",
"tags": [
"Vendor Advisory"
],
"url": "http://www.postfix.org/CVE-2011-1720.html"
},
{
"name": "47778",
"refsource": "BID",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/47778"
},
{
"name": "DSA-2233",
"refsource": "DEBIAN",
"tags": [],
"url": "http://www.debian.org/security/2011/dsa-2233"
},
{
"name": "1025521",
"refsource": "SECTRACK",
"tags": [],
"url": "http://www.securitytracker.com/id?1025521"
},
{
"name": "MDVSA-2011:090",
"refsource": "MANDRIVA",
"tags": [],
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
},
{
"name": "SUSE-SA:2011:023",
"refsource": "SUSE",
"tags": [],
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
},
{
"name": "8247",
"refsource": "SREASON",
"tags": [],
"url": "http://securityreason.com/securityalert/8247"
},
{
"name": "GLSA-201206-33",
"refsource": "GENTOO",
"tags": [],
"url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
},
{
"name": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705",
"refsource": "CONFIRM",
"tags": [],
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"name": "postfix-cyrus-sasl-code-exec(67359)",
"refsource": "XF",
"tags": [],
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
},
{
"name": "20110509 Memory corruption in Postfix SMTP server Cyrus SASL support (CVE-2011-1720)",
"refsource": "BUGTRAQ",
"tags": [],
"url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
}
]
}
},
"impact": {
"baseMetricV2": {
"cvssV2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"severity": "MEDIUM",
"userInteractionRequired": false
}
},
"lastModifiedDate": "2018-10-09T19:31Z",
"publishedDate": "2011-05-13T17:05Z"
}
}
}
FKIE_CVE-2011-1720
Vulnerability from fkie_nvd - Published: 2011-05-13 17:05 - Updated: 2025-04-11 00:51| URL | Tags | ||
|---|---|---|---|
| cve@mitre.org | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
| cve@mitre.org | http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html | ||
| cve@mitre.org | http://secunia.com/advisories/44500 | Vendor Advisory | |
| cve@mitre.org | http://security.gentoo.org/glsa/glsa-201206-33.xml | ||
| cve@mitre.org | http://securityreason.com/securityalert/8247 | ||
| cve@mitre.org | http://www.debian.org/security/2011/dsa-2233 | ||
| cve@mitre.org | http://www.kb.cert.org/vuls/id/727230 | US Government Resource | |
| cve@mitre.org | http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html | ||
| cve@mitre.org | http://www.mandriva.com/security/advisories?name=MDVSA-2011:090 | ||
| cve@mitre.org | http://www.osvdb.org/72259 | ||
| cve@mitre.org | http://www.postfix.org/CVE-2011-1720.html | Vendor Advisory | |
| cve@mitre.org | http://www.postfix.org/announcements/postfix-2.8.3.html | Vendor Advisory | |
| cve@mitre.org | http://www.securityfocus.com/archive/1/517917/100/0/threaded | ||
| cve@mitre.org | http://www.securityfocus.com/bid/47778 | Patch | |
| cve@mitre.org | http://www.securitytracker.com/id?1025521 | ||
| cve@mitre.org | http://www.ubuntu.com/usn/usn-1131-1 | ||
| cve@mitre.org | https://bugzilla.redhat.com/show_bug.cgi?id=699035 | ||
| cve@mitre.org | https://exchange.xforce.ibmcloud.com/vulnerabilities/67359 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://kb.juniper.net/InfoCenter/index?page=content&id=JSA10705 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://secunia.com/advisories/44500 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://security.gentoo.org/glsa/glsa-201206-33.xml | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://securityreason.com/securityalert/8247 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2011/dsa-2233 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.kb.cert.org/vuls/id/727230 | US Government Resource | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.mandriva.com/security/advisories?name=MDVSA-2011:090 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.osvdb.org/72259 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.postfix.org/CVE-2011-1720.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.postfix.org/announcements/postfix-2.8.3.html | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/archive/1/517917/100/0/threaded | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/47778 | Patch | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id?1025521 | ||
| af854a3a-2127-422b-91ae-364da2661108 | http://www.ubuntu.com/usn/usn-1131-1 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://bugzilla.redhat.com/show_bug.cgi?id=699035 | ||
| af854a3a-2127-422b-91ae-364da2661108 | https://exchange.xforce.ibmcloud.com/vulnerabilities/67359 |
| Vendor | Product | Version | |
|---|---|---|---|
| postfix | postfix | 2.0.0 | |
| postfix | postfix | 2.0.1 | |
| postfix | postfix | 2.0.2 | |
| postfix | postfix | 2.0.3 | |
| postfix | postfix | 2.0.4 | |
| postfix | postfix | 2.0.5 | |
| postfix | postfix | 2.0.6 | |
| postfix | postfix | 2.0.7 | |
| postfix | postfix | 2.0.8 | |
| postfix | postfix | 2.0.9 | |
| postfix | postfix | 2.0.10 | |
| postfix | postfix | 2.0.11 | |
| postfix | postfix | 2.0.12 | |
| postfix | postfix | 2.0.13 | |
| postfix | postfix | 2.0.14 | |
| postfix | postfix | 2.0.15 | |
| postfix | postfix | 2.0.16 | |
| postfix | postfix | 2.0.17 | |
| postfix | postfix | 2.0.18 | |
| postfix | postfix | 2.0.19 | |
| postfix | postfix | 2.1.0 | |
| postfix | postfix | 2.1.1 | |
| postfix | postfix | 2.1.2 | |
| postfix | postfix | 2.1.3 | |
| postfix | postfix | 2.1.4 | |
| postfix | postfix | 2.1.5 | |
| postfix | postfix | 2.1.6 | |
| postfix | postfix | 2.2.0 | |
| postfix | postfix | 2.2.1 | |
| postfix | postfix | 2.2.2 | |
| postfix | postfix | 2.2.3 | |
| postfix | postfix | 2.2.4 | |
| postfix | postfix | 2.2.5 | |
| postfix | postfix | 2.2.6 | |
| postfix | postfix | 2.2.7 | |
| postfix | postfix | 2.2.8 | |
| postfix | postfix | 2.2.9 | |
| postfix | postfix | 2.2.10 | |
| postfix | postfix | 2.2.11 | |
| postfix | postfix | 2.2.12 | |
| postfix | postfix | 2.3 | |
| postfix | postfix | 2.3.0 | |
| postfix | postfix | 2.3.1 | |
| postfix | postfix | 2.3.2 | |
| postfix | postfix | 2.3.3 | |
| postfix | postfix | 2.3.4 | |
| postfix | postfix | 2.3.5 | |
| postfix | postfix | 2.3.6 | |
| postfix | postfix | 2.3.7 | |
| postfix | postfix | 2.3.8 | |
| postfix | postfix | 2.3.9 | |
| postfix | postfix | 2.3.10 | |
| postfix | postfix | 2.3.11 | |
| postfix | postfix | 2.3.12 | |
| postfix | postfix | 2.3.13 | |
| postfix | postfix | 2.3.14 | |
| postfix | postfix | 2.3.15 | |
| postfix | postfix | 2.3.16 | |
| postfix | postfix | 2.3.17 | |
| postfix | postfix | 2.3.18 | |
| postfix | postfix | 2.3.19 | |
| postfix | postfix | 2.4 | |
| postfix | postfix | 2.4.0 | |
| postfix | postfix | 2.4.1 | |
| postfix | postfix | 2.4.2 | |
| postfix | postfix | 2.4.3 | |
| postfix | postfix | 2.4.4 | |
| postfix | postfix | 2.4.5 | |
| postfix | postfix | 2.4.6 | |
| postfix | postfix | 2.4.7 | |
| postfix | postfix | 2.4.8 | |
| postfix | postfix | 2.4.9 | |
| postfix | postfix | 2.4.10 | |
| postfix | postfix | 2.4.11 | |
| postfix | postfix | 2.4.12 | |
| postfix | postfix | 2.4.13 | |
| postfix | postfix | 2.4.14 | |
| postfix | postfix | 2.4.15 | |
| postfix | postfix | 2.5.0 | |
| postfix | postfix | 2.5.1 | |
| postfix | postfix | 2.5.2 | |
| postfix | postfix | 2.5.3 | |
| postfix | postfix | 2.5.4 | |
| postfix | postfix | 2.5.5 | |
| postfix | postfix | 2.5.6 | |
| postfix | postfix | 2.5.7 | |
| postfix | postfix | 2.5.8 | |
| postfix | postfix | 2.5.9 | |
| postfix | postfix | 2.5.10 | |
| postfix | postfix | 2.5.11 | |
| postfix | postfix | 2.5.12 | |
| postfix | postfix | 2.6 | |
| postfix | postfix | 2.6.0 | |
| postfix | postfix | 2.6.1 | |
| postfix | postfix | 2.6.2 | |
| postfix | postfix | 2.6.3 | |
| postfix | postfix | 2.6.4 | |
| postfix | postfix | 2.6.5 | |
| postfix | postfix | 2.6.6 | |
| postfix | postfix | 2.6.7 | |
| postfix | postfix | 2.6.8 | |
| postfix | postfix | 2.6.9 | |
| postfix | postfix | 2.7.0 | |
| postfix | postfix | 2.7.1 | |
| postfix | postfix | 2.7.2 | |
| postfix | postfix | 2.7.3 | |
| postfix | postfix | 2.8.0 | |
| postfix | postfix | 2.8.1 | |
| postfix | postfix | 2.8.2 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DB5D16A3-59DA-407B-82E4-65C39EBD3710",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "6E5DF3A2-5F47-4D2A-802B-CE53872DDEFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "1A7A4BE9-7CBE-404F-B577-933AC26E6E81",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8872C496-2430-4EA6-B417-51C6877B874A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "EB9646BA-E57D-4E1D-BF1A-FA137CA00ED8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "66B95D87-5B0B-48F6-8379-2521CFDE7CA9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "A09799F5-6084-4F06-B851-4FEA7873BF35",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "9230082E-FE88-4001-A614-43E8DD76471B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "258010A6-6B75-4663-AD5C-E7AD48B38DEE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "602E668A-1343-457B-B0E1-CAB3CCA05BD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "83C3C7F7-016F-458B-B40D-E06080552045",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "FE51A934-BFD2-4E61-9827-A934995BDCAB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.12:*:*:*:*:*:*:*",
"matchCriteriaId": "BDF57DB8-3D17-4868-9FDF-81A0645FBC5A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.13:*:*:*:*:*:*:*",
"matchCriteriaId": "1BDE9CC6-A7C7-4B0E-A341-E441EF9C33FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.14:*:*:*:*:*:*:*",
"matchCriteriaId": "7D7ECFA4-01CF-4C44-949D-7781767B724A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.15:*:*:*:*:*:*:*",
"matchCriteriaId": "A568A8FC-7BB0-431B-8BFE-1BF28DD545B2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.16:*:*:*:*:*:*:*",
"matchCriteriaId": "B2273956-8CEB-439E-8841-953580AE673D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.17:*:*:*:*:*:*:*",
"matchCriteriaId": "9E074865-92E2-4AFC-8542-00273FDFACEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.18:*:*:*:*:*:*:*",
"matchCriteriaId": "1274628A-B6F8-48DA-A7B0-7629362A0383",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.0.19:*:*:*:*:*:*:*",
"matchCriteriaId": "4FAE9B3D-C867-4100-9F1A-1A925E6BCA2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "123ED520-D9A9-457E-B0FF-2164678F2FDA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "7F03CC36-4E01-4298-8BF2-208EC2126E2D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "DA763611-3C94-40EB-AC16-F6860FCBFDAC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "E8725859-159E-49A5-91F2-12A6B300AE76",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6D3B5347-F7FD-4291-8535-9D71F9F49568",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E2750F62-79D5-41ED-8624-4DC36A23A03D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.1.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C1D09CC9-07C8-42C7-B7B2-25251C8615A8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F28A5B6A-466B-4B24-9BD4-9DE15642A724",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "C8E7B624-C991-4EA1-A977-6C06F57B4E2F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E899C1C0-18D1-43DE-BC55-C3C14F5395D2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "05F2CA7C-1BCE-4EBB-BFAA-6C27F03CAC9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "903BF741-FD7E-41F7-802D-88A09B7EFFFF",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "7F0A444A-E6FE-4585-BA6C-6061A87C6144",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "161082B7-A757-496C-9D35-681851CEA10B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "B02E2034-BB39-4B86-81CA-3BB93A4E4849",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "29CF0FA6-F4F6-4A4B-89A6-057F835FFE89",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "0055B0EA-775F-4670-A3F9-C1676DBB97D5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "363704AE-66A9-4B58-A57E-47748F299471",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5226F933-9FB6-4BF6-AC3B-1A22D22F92F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.2.12:*:*:*:*:*:*:*",
"matchCriteriaId": "0066AE84-D27D-4E9B-851B-40EDFD07C0BB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "2B739C7B-93CC-4367-B006-E8A721ECBCF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "F08A3C19-AEB6-4E0C-A41D-01024DC0A25D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BAE8A81E-3856-4908-B7B7-9CF511CA2A21",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "7B935272-1EC7-4C70-8299-9DC7594809EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "1647690F-D015-4DC4-9FB7-F5E9F0C430D9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "A814997B-A612-493F-AA85-BA5A187A91FA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "449E9764-54F4-46F9-9E4D-F2C96EC5F37E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DF4A15A5-0994-4A3B-B4CD-1C5D9F411FDE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5E3FB858-1B20-450B-9181-A1FE1C2B9DB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "C6BBD449-6F03-4EFE-8C87-B5014F0381F5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "DEBD42EA-B31E-4E37-BF28-FEBB18369A18",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.10:*:*:*:*:*:*:*",
"matchCriteriaId": "B92BCC42-6E9F-44CB-A755-004B6DBD9D41",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.11:*:*:*:*:*:*:*",
"matchCriteriaId": "1B67A4AE-2C1C-49D6-9F53-05CAB51273E8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.12:*:*:*:*:*:*:*",
"matchCriteriaId": "7A64D948-9441-492F-B9E5-DE5D5A3D7266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.13:*:*:*:*:*:*:*",
"matchCriteriaId": "6D7BCB67-AF9E-4343-827B-D783C71BAF46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.14:*:*:*:*:*:*:*",
"matchCriteriaId": "265AD494-E5EB-423B-9C20-62BCB1C3B9B5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.15:*:*:*:*:*:*:*",
"matchCriteriaId": "B63D1C8C-6E55-43B1-9479-5CE7A917C501",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.16:*:*:*:*:*:*:*",
"matchCriteriaId": "208C73B6-88AF-4D8D-A7BE-8AB4E1A4F07B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.17:*:*:*:*:*:*:*",
"matchCriteriaId": "11993437-8CE2-44A7-BEF8-D5F7410DCB52",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.18:*:*:*:*:*:*:*",
"matchCriteriaId": "E13F9414-C71A-49A7-9A84-BC3151E95598",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.3.19:*:*:*:*:*:*:*",
"matchCriteriaId": "546CC4D9-D2F4-4725-AD2D-200E6549BB63",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "998D1069-1CF5-42C5-8668-49D72E2D2F17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "A2138A68-3F3D-4C7E-9FEB-2C8A445F2789",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "ED5E0EB5-ECC6-4573-9EA7-83E5741DA3CD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "790C02A8-95DD-42BE-8A1C-1C6D6DDCC443",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0A0034F2-585D-4A98-8428-996A726712DE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F8B162B5-DEF5-46AD-87D1-734B3B637D46",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "0DF3730A-0FFD-4C23-B758-BBA67CC9CD92",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "10E8E5E2-5674-40D5-AD86-8C4DDB442EE6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "690EDC73-47B5-4891-86A5-37B6ED80E145",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "B751BA4B-B7C8-4A87-A03C-5C91678FC832",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "08943D31-2139-45D3-A0DB-0C11C31875CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "591FB74F-BD86-4314-A359-739A245D2642",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "5F2EF7B2-943F-4DFA-8249-7FC0F9FB0312",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.12:*:*:*:*:*:*:*",
"matchCriteriaId": "9B3AFC1E-01FF-4F91-8C82-5C16378812C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.13:*:*:*:*:*:*:*",
"matchCriteriaId": "95E552B8-8B26-4DEE-BC6A-BC0B01C42474",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.14:*:*:*:*:*:*:*",
"matchCriteriaId": "66E26194-A7E6-4A99-8F55-7422A7E9BAB9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.4.15:*:*:*:*:*:*:*",
"matchCriteriaId": "58097735-FE3B-48B7-B5EA-3CD530E16031",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "CA31260C-1C67-4E76-9F56-2359BFA0B197",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "58F1FC50-B6EB-48FD-A2FA-B8BEB05719DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A1DE90BD-B5F9-4762-B086-130AB04F3CB0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "CCD5258B-C9DE-47BD-9172-27618F220201",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.4:*:*:*:*:*:*:*",
"matchCriteriaId": "BC95B8DD-C8C6-4FC4-81A5-23D7669DA22A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.5:*:*:*:*:*:*:*",
"matchCriteriaId": "894002C8-F3C1-4241-96FE-C088BBD0FCED",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.6:*:*:*:*:*:*:*",
"matchCriteriaId": "C91BA7D1-2A5B-4721-8E13-6520D6F0114B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.7:*:*:*:*:*:*:*",
"matchCriteriaId": "FBE79FBB-801F-4B1E-8FB8-CB2A1FAF6EEB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.8:*:*:*:*:*:*:*",
"matchCriteriaId": "253DB571-62B7-4015-A758-9DE55AAB8B9E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.9:*:*:*:*:*:*:*",
"matchCriteriaId": "F7AF9D8C-B11C-4681-84CE-5C86926C85F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.10:*:*:*:*:*:*:*",
"matchCriteriaId": "955FBDF4-5103-4B19-A5F1-9468F73C7A54",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.11:*:*:*:*:*:*:*",
"matchCriteriaId": "4AAC0FF5-9699-4011-8C07-5DDAF13B64A4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.5.12:*:*:*:*:*:*:*",
"matchCriteriaId": "1262ECC9-7496-4D6B-880E-6CA85EE5CD46",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "5D1E6461-2F2A-49C5-9B2B-08DE418F2F7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "E5B3F710-13EF-4A36-B191-E0FCC1D98E23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EFB5988E-D04B-43B9-A980-82FD44D1D198",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "12A1021E-587D-47D3-80E8-43D9CCB4BD72",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "FAC9B923-222D-4F7F-970C-0B9ADF4E86F6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D31B75AE-FF82-4B70-BDEC-4B0FA791A085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C148A9D5-8899-4956-BE45-C4DBD4A2BE08",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.6:*:*:*:*:*:*:*",
"matchCriteriaId": "558A2B97-6582-445F-991C-4DD530E991DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.7:*:*:*:*:*:*:*",
"matchCriteriaId": "56509587-6CE6-4497-B571-0A014E1FE064",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1B24CEB4-4F57-46CB-990B-AB664CEC96EE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.6.9:*:*:*:*:*:*:*",
"matchCriteriaId": "5E40EEF8-F075-4B87-BDE7-C2D1A39B2F80",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postfix:postfix:2.7.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D5044BFB-4F00-4FFC-9A66-2FDC666B6C2B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "827897F6-2A24-45EC-A072-8C02BA726069",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9A3CFD6A-86E2-4E7B-BAC2-3163FC7DBF17",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7705A10C-0BA3-4F04-B757-5890B6A2A860",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:postfix:postfix:2.8.0:*:*:*:*:*:*:*",
"matchCriteriaId": "133B8398-2495-47CD-B140-5247ECE86EE4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.8.1:*:*:*:*:*:*:*",
"matchCriteriaId": "D14612B0-7F74-4ED6-89F9-A11ED75A577F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:postfix:postfix:2.8.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5F5C105E-B22B-48B4-8DC8-5B747792C102",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method."
},
{
"lang": "es",
"value": "El servidor SMTP en Postfix anterior a v2.5.13, v2.6.x anterior a v2.6.10, v2.7.x anterior a v2.7.4, y v2.8.x anterior a v2.8.3, cuando ciertos m\u00e9todos Cyrus SASL de autenticaci\u00f3n son activados, no crea un nuevo manejador de servidor despu\u00e9s de que la autentificaci\u00f3n falle, lo que permite a atacantes remotos provocar una denegaci\u00f3n de servicio (corrupci\u00f3n de memoria libre y ca\u00edda de demonio) o posiblemente ejecutar c\u00f3digo de su elecci\u00f3n a tra\u00b4ves de un comando AUTH no v\u00e1lido con un m\u00e9todo seguido por un comando AUTH con un m\u00e9todo diferente."
}
],
"id": "CVE-2011-1720",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 6.8,
"confidentialityImpact": "PARTIAL",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:P/I:P/A:P",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 6.4,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": false
}
]
},
"published": "2011-05-13T17:05:43.207",
"references": [
{
"source": "cve@mitre.org",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "cve@mitre.org",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44500"
},
{
"source": "cve@mitre.org",
"url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
},
{
"source": "cve@mitre.org",
"url": "http://securityreason.com/securityalert/8247"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2011/dsa-2233"
},
{
"source": "cve@mitre.org",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/727230"
},
{
"source": "cve@mitre.org",
"url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/72259"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.postfix.org/CVE-2011-1720.html"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/47778"
},
{
"source": "cve@mitre.org",
"url": "http://www.securitytracker.com/id?1025521"
},
{
"source": "cve@mitre.org",
"url": "http://www.ubuntu.com/usn/usn-1131-1"
},
{
"source": "cve@mitre.org",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://kb.juniper.net/InfoCenter/index?page=content\u0026id=JSA10705"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://lists.opensuse.org/opensuse-security-announce/2011-05/msg00002.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/44500"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://security.gentoo.org/glsa/glsa-201206-33.xml"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://securityreason.com/securityalert/8247"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2233"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"US Government Resource"
],
"url": "http://www.kb.cert.org/vuls/id/727230"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mail-archive.com/postfix-announce%40postfix.org/msg00007.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:090"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/72259"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.postfix.org/CVE-2011-1720.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.postfix.org/announcements/postfix-2.8.3.html"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/archive/1/517917/100/0/threaded"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "http://www.securityfocus.com/bid/47778"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securitytracker.com/id?1025521"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.ubuntu.com/usn/usn-1131-1"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/67359"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-119"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
RHSA-2011:0843
Vulnerability from csaf_redhat - Published: 2011-05-31 15:35 - Updated: 2025-11-21 17:38Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated postfix packages that fix one security issue are now available for\nRed Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL),\nand TLS.\n\nA heap-based buffer over-read flaw was found in the way Postfix performed\nSASL handlers management for SMTP sessions, when Cyrus SASL authentication\nwas enabled. A remote attacker could use this flaw to cause the Postfix\nsmtpd server to crash via a specially-crafted SASL authentication request.\nThe smtpd process was automatically restarted by the postfix master process\nafter the time configured with service_throttle_time elapsed.\n(CVE-2011-1720)\n\nNote: Cyrus SASL authentication for Postfix is not enabled by default.\n\nRed Hat would like to thank the CERT/CC for reporting this issue. Upstream\nacknowledges Thomas Jarosch of Intra2net AG as the original reporter.\n\nUsers of Postfix are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. After installing this\nupdate, the postfix service will be restarted automatically.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0843",
"url": "https://access.redhat.com/errata/RHSA-2011:0843"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "699035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0843.json"
}
],
"title": "Red Hat Security Advisory: postfix security update",
"tracking": {
"current_release_date": "2025-11-21T17:38:18+00:00",
"generator": {
"date": "2025-11-21T17:38:18+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.6.12"
}
},
"id": "RHSA-2011:0843",
"initial_release_date": "2011-05-31T15:35:00+00:00",
"revision_history": [
{
"date": "2011-05-31T15:35:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-05-31T11:46:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2025-11-21T17:38:18+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.ia64",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.ia64",
"product_id": "postfix-2:2.2.10-1.5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"product": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"product_id": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.3.3-2.3.el5_6?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"product": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"product_id": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.3.3-2.3.el5_6?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.ia64",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.ia64",
"product_id": "postfix-2:2.3.3-2.3.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=ia64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.src",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.src",
"product_id": "postfix-2:2.2.10-1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.src",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.src",
"product_id": "postfix-2:2.3.3-2.3.el5_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.6.6-2.2.el6_1.src",
"product": {
"name": "postfix-2:2.6.6-2.2.el6_1.src",
"product_id": "postfix-2:2.6.6-2.2.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.6.6-2.2.el6_1?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.x86_64",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.x86_64",
"product_id": "postfix-2:2.2.10-1.5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"product": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"product_id": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.3.3-2.3.el5_6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"product": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"product_id": "postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.3.3-2.3.el5_6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.x86_64",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.x86_64",
"product_id": "postfix-2:2.3.3-2.3.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"product": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"product_id": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-perl-scripts@2.6.6-2.2.el6_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"product": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"product_id": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.6.6-2.2.el6_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.6.6-2.2.el6_1.x86_64",
"product": {
"name": "postfix-2:2.6.6-2.2.el6_1.x86_64",
"product_id": "postfix-2:2.6.6-2.2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.6.6-2.2.el6_1?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.i386",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.i386",
"product_id": "postfix-2:2.2.10-1.5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"product": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"product_id": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.3.3-2.3.el5_6?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"product": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"product_id": "postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.3.3-2.3.el5_6?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.i386",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.i386",
"product_id": "postfix-2:2.3.3-2.3.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=i386\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.ppc",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.ppc",
"product_id": "postfix-2:2.2.10-1.5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"product": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"product_id": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.3.3-2.3.el5_6?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"product": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"product_id": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.3.3-2.3.el5_6?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.ppc",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.ppc",
"product_id": "postfix-2:2.3.3-2.3.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=ppc\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.s390x",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.s390x",
"product_id": "postfix-2:2.2.10-1.5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"product": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"product_id": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.3.3-2.3.el5_6?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"product": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"product_id": "postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.3.3-2.3.el5_6?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.s390x",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.s390x",
"product_id": "postfix-2:2.3.3-2.3.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"product": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"product_id": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-perl-scripts@2.6.6-2.2.el6_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"product": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"product_id": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.6.6-2.2.el6_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.6.6-2.2.el6_1.s390x",
"product": {
"name": "postfix-2:2.6.6-2.2.el6_1.s390x",
"product_id": "postfix-2:2.6.6-2.2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.6.6-2.2.el6_1?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.s390",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.s390",
"product_id": "postfix-2:2.2.10-1.5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=s390\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=s390\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=s390\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"product": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"product_id": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-perl-scripts@2.6.6-2.2.el6_1?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"product": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"product_id": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.6.6-2.2.el6_1?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.6.6-2.2.el6_1.i686",
"product": {
"name": "postfix-2:2.6.6-2.2.el6_1.i686",
"product_id": "postfix-2:2.6.6-2.2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.6.6-2.2.el6_1?arch=i686\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"product": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"product_id": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-perl-scripts@2.6.6-2.2.el6_1?arch=ppc64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"product": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"product_id": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.6.6-2.2.el6_1?arch=ppc64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.6.6-2.2.el6_1.ppc64",
"product": {
"name": "postfix-2:2.6.6-2.2.el6_1.ppc64",
"product_id": "postfix-2:2.6.6-2.2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.6.6-2.2.el6_1?arch=ppc64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.src"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.src"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.src"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.src"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.i386"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ia64"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ppc"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.s390x"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.src"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.x86_64"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.i386"
},
"product_reference": "postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64"
},
"product_reference": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc"
},
"product_reference": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x"
},
"product_reference": "postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386"
},
"product_reference": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64"
},
"product_reference": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc"
},
"product_reference": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x"
},
"product_reference": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64"
},
"product_reference": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.src"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.src"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"CERT/CC"
]
}
],
"cve": "CVE-2011-1720",
"discovery_date": "2011-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "699035"
}
],
"notes": [
{
"category": "description",
"text": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(smtpd): Crash due to improper management of SASL handlers for SMTP sessions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:postfix-2:2.2.10-1.5.el4.i386",
"4AS:postfix-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-2:2.2.10-1.5.el4.s390",
"4AS:postfix-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-2:2.2.10-1.5.el4.src",
"4AS:postfix-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-2:2.2.10-1.5.el4.src",
"4Desktop:postfix-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-2:2.2.10-1.5.el4.i386",
"4ES:postfix-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-2:2.2.10-1.5.el4.s390",
"4ES:postfix-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-2:2.2.10-1.5.el4.src",
"4ES:postfix-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-2:2.2.10-1.5.el4.i386",
"4WS:postfix-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-2:2.2.10-1.5.el4.s390",
"4WS:postfix-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-2:2.2.10-1.5.el4.src",
"4WS:postfix-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.src",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1720"
},
{
"category": "external",
"summary": "RHBZ#699035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1720"
}
],
"release_date": "2011-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T15:35:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:postfix-2:2.2.10-1.5.el4.i386",
"4AS:postfix-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-2:2.2.10-1.5.el4.s390",
"4AS:postfix-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-2:2.2.10-1.5.el4.src",
"4AS:postfix-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-2:2.2.10-1.5.el4.src",
"4Desktop:postfix-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-2:2.2.10-1.5.el4.i386",
"4ES:postfix-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-2:2.2.10-1.5.el4.s390",
"4ES:postfix-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-2:2.2.10-1.5.el4.src",
"4ES:postfix-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-2:2.2.10-1.5.el4.i386",
"4WS:postfix-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-2:2.2.10-1.5.el4.s390",
"4WS:postfix-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-2:2.2.10-1.5.el4.src",
"4WS:postfix-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.src",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0843"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS:postfix-2:2.2.10-1.5.el4.i386",
"4AS:postfix-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-2:2.2.10-1.5.el4.s390",
"4AS:postfix-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-2:2.2.10-1.5.el4.src",
"4AS:postfix-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-2:2.2.10-1.5.el4.src",
"4Desktop:postfix-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-2:2.2.10-1.5.el4.i386",
"4ES:postfix-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-2:2.2.10-1.5.el4.s390",
"4ES:postfix-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-2:2.2.10-1.5.el4.src",
"4ES:postfix-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-2:2.2.10-1.5.el4.i386",
"4WS:postfix-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-2:2.2.10-1.5.el4.s390",
"4WS:postfix-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-2:2.2.10-1.5.el4.src",
"4WS:postfix-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.src",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "(smtpd): Crash due to improper management of SASL handlers for SMTP sessions"
}
]
}
RHSA-2011_0843
Vulnerability from csaf_redhat - Published: 2011-05-31 15:35 - Updated: 2024-11-22 04:22Notes
{
"document": {
"aggregate_severity": {
"namespace": "https://access.redhat.com/security/updates/classification/",
"text": "Moderate"
},
"category": "csaf_security_advisory",
"csaf_version": "2.0",
"distribution": {
"text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.",
"tlp": {
"label": "WHITE",
"url": "https://www.first.org/tlp/"
}
},
"lang": "en",
"notes": [
{
"category": "summary",
"text": "Updated postfix packages that fix one security issue are now available for\nRed Hat Enterprise Linux 4, 5, and 6.\n\nThe Red Hat Security Response Team has rated this update as having moderate\nsecurity impact. A Common Vulnerability Scoring System (CVSS) base score,\nwhich gives a detailed severity rating, is available from the CVE link in\nthe References section.",
"title": "Topic"
},
{
"category": "general",
"text": "Postfix is a Mail Transport Agent (MTA), supporting LDAP, SMTP AUTH (SASL),\nand TLS.\n\nA heap-based buffer over-read flaw was found in the way Postfix performed\nSASL handlers management for SMTP sessions, when Cyrus SASL authentication\nwas enabled. A remote attacker could use this flaw to cause the Postfix\nsmtpd server to crash via a specially-crafted SASL authentication request.\nThe smtpd process was automatically restarted by the postfix master process\nafter the time configured with service_throttle_time elapsed.\n(CVE-2011-1720)\n\nNote: Cyrus SASL authentication for Postfix is not enabled by default.\n\nRed Hat would like to thank the CERT/CC for reporting this issue. Upstream\nacknowledges Thomas Jarosch of Intra2net AG as the original reporter.\n\nUsers of Postfix are advised to upgrade to these updated packages, which\ncontain a backported patch to resolve this issue. After installing this\nupdate, the postfix service will be restarted automatically.",
"title": "Details"
},
{
"category": "legal_disclaimer",
"text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.",
"title": "Terms of Use"
}
],
"publisher": {
"category": "vendor",
"contact_details": "https://access.redhat.com/security/team/contact/",
"issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.",
"name": "Red Hat Product Security",
"namespace": "https://www.redhat.com"
},
"references": [
{
"category": "self",
"summary": "https://access.redhat.com/errata/RHSA-2011:0843",
"url": "https://access.redhat.com/errata/RHSA-2011:0843"
},
{
"category": "external",
"summary": "https://access.redhat.com/security/updates/classification/#moderate",
"url": "https://access.redhat.com/security/updates/classification/#moderate"
},
{
"category": "external",
"summary": "699035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"category": "self",
"summary": "Canonical URL",
"url": "https://security.access.redhat.com/data/csaf/v2/advisories/2011/rhsa-2011_0843.json"
}
],
"title": "Red Hat Security Advisory: postfix security update",
"tracking": {
"current_release_date": "2024-11-22T04:22:31+00:00",
"generator": {
"date": "2024-11-22T04:22:31+00:00",
"engine": {
"name": "Red Hat SDEngine",
"version": "4.2.1"
}
},
"id": "RHSA-2011:0843",
"initial_release_date": "2011-05-31T15:35:00+00:00",
"revision_history": [
{
"date": "2011-05-31T15:35:00+00:00",
"number": "1",
"summary": "Initial version"
},
{
"date": "2011-05-31T11:46:03+00:00",
"number": "2",
"summary": "Last updated version"
},
{
"date": "2024-11-22T04:22:31+00:00",
"number": "3",
"summary": "Last generated version"
}
],
"status": "final",
"version": "3"
}
},
"product_tree": {
"branches": [
{
"branches": [
{
"branches": [
{
"category": "product_name",
"name": "Red Hat Enterprise Linux AS version 4",
"product": {
"name": "Red Hat Enterprise Linux AS version 4",
"product_id": "4AS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::as"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Desktop version 4",
"product": {
"name": "Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::desktop"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux ES version 4",
"product": {
"name": "Red Hat Enterprise Linux ES version 4",
"product_id": "4ES",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::es"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux WS version 4",
"product": {
"name": "Red Hat Enterprise Linux WS version 4",
"product_id": "4WS",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:4::ws"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product": {
"name": "Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:5::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
},
{
"category": "product_name",
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product": {
"name": "Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z",
"product_identification_helper": {
"cpe": "cpe:/o:redhat:enterprise_linux:6::server"
}
}
}
],
"category": "product_family",
"name": "Red Hat Enterprise Linux"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.ia64",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.ia64",
"product_id": "postfix-2:2.2.10-1.5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"product": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"product_id": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.3.3-2.3.el5_6?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"product": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"product_id": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.3.3-2.3.el5_6?arch=ia64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.ia64",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.ia64",
"product_id": "postfix-2:2.3.3-2.3.el5_6.ia64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=ia64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ia64"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.src",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.src",
"product_id": "postfix-2:2.2.10-1.5.el4.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.src",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.src",
"product_id": "postfix-2:2.3.3-2.3.el5_6.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=src\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.6.6-2.2.el6_1.src",
"product": {
"name": "postfix-2:2.6.6-2.2.el6_1.src",
"product_id": "postfix-2:2.6.6-2.2.el6_1.src",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.6.6-2.2.el6_1?arch=src\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "src"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.x86_64",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.x86_64",
"product_id": "postfix-2:2.2.10-1.5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"product": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"product_id": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.3.3-2.3.el5_6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"product": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"product_id": "postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.3.3-2.3.el5_6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.x86_64",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.x86_64",
"product_id": "postfix-2:2.3.3-2.3.el5_6.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"product": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"product_id": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-perl-scripts@2.6.6-2.2.el6_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"product": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"product_id": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.6.6-2.2.el6_1?arch=x86_64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.6.6-2.2.el6_1.x86_64",
"product": {
"name": "postfix-2:2.6.6-2.2.el6_1.x86_64",
"product_id": "postfix-2:2.6.6-2.2.el6_1.x86_64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.6.6-2.2.el6_1?arch=x86_64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "x86_64"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.i386",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.i386",
"product_id": "postfix-2:2.2.10-1.5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"product": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"product_id": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.3.3-2.3.el5_6?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"product": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"product_id": "postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.3.3-2.3.el5_6?arch=i386\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.i386",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.i386",
"product_id": "postfix-2:2.3.3-2.3.el5_6.i386",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=i386\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i386"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.ppc",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.ppc",
"product_id": "postfix-2:2.2.10-1.5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"product": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"product_id": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.3.3-2.3.el5_6?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"product": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"product_id": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.3.3-2.3.el5_6?arch=ppc\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.ppc",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.ppc",
"product_id": "postfix-2:2.3.3-2.3.el5_6.ppc",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=ppc\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.s390x",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.s390x",
"product_id": "postfix-2:2.2.10-1.5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"product": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"product_id": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.3.3-2.3.el5_6?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"product": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"product_id": "postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.3.3-2.3.el5_6?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.3.3-2.3.el5_6.s390x",
"product": {
"name": "postfix-2:2.3.3-2.3.el5_6.s390x",
"product_id": "postfix-2:2.3.3-2.3.el5_6.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.3.3-2.3.el5_6?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"product": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"product_id": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-perl-scripts@2.6.6-2.2.el6_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"product": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"product_id": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.6.6-2.2.el6_1?arch=s390x\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.6.6-2.2.el6_1.s390x",
"product": {
"name": "postfix-2:2.6.6-2.2.el6_1.s390x",
"product_id": "postfix-2:2.6.6-2.2.el6_1.s390x",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.6.6-2.2.el6_1?arch=s390x\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390x"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-2:2.2.10-1.5.el4.s390",
"product": {
"name": "postfix-2:2.2.10-1.5.el4.s390",
"product_id": "postfix-2:2.2.10-1.5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.2.10-1.5.el4?arch=s390\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"product": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"product_id": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-pflogsumm@2.2.10-1.5.el4?arch=s390\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"product": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"product_id": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.2.10-1.5.el4?arch=s390\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "s390"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"product": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"product_id": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-perl-scripts@2.6.6-2.2.el6_1?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"product": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"product_id": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.6.6-2.2.el6_1?arch=i686\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.6.6-2.2.el6_1.i686",
"product": {
"name": "postfix-2:2.6.6-2.2.el6_1.i686",
"product_id": "postfix-2:2.6.6-2.2.el6_1.i686",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.6.6-2.2.el6_1?arch=i686\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "i686"
},
{
"branches": [
{
"category": "product_version",
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"product": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"product_id": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-perl-scripts@2.6.6-2.2.el6_1?arch=ppc64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"product": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"product_id": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix-debuginfo@2.6.6-2.2.el6_1?arch=ppc64\u0026epoch=2"
}
}
},
{
"category": "product_version",
"name": "postfix-2:2.6.6-2.2.el6_1.ppc64",
"product": {
"name": "postfix-2:2.6.6-2.2.el6_1.ppc64",
"product_id": "postfix-2:2.6.6-2.2.el6_1.ppc64",
"product_identification_helper": {
"purl": "pkg:rpm/redhat/postfix@2.6.6-2.2.el6_1?arch=ppc64\u0026epoch=2"
}
}
}
],
"category": "architecture",
"name": "ppc64"
}
],
"category": "vendor",
"name": "Red Hat"
}
],
"relationships": [
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.src as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.src"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.src",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux AS version 4",
"product_id": "4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4AS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.src as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.src"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.src",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux Desktop version 4",
"product_id": "4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4Desktop"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.src as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.src"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.src",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux ES version 4",
"product_id": "4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4ES"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.src as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.src"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.src",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64 as a component of Red Hat Enterprise Linux WS version 4",
"product_id": "4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64"
},
"product_reference": "postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"relates_to_product_reference": "4WS"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.i386"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ia64"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ppc"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.s390x"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.src as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.src"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.src",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.3.3-2.3.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.x86_64"
},
"product_reference": "postfix-2:2.3.3-2.3.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.i386"
},
"product_reference": "postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64"
},
"product_reference": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc"
},
"product_reference": "postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x"
},
"product_reference": "postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386"
},
"product_reference": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64"
},
"product_reference": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc"
},
"product_reference": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x"
},
"product_reference": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64 as a component of Red Hat Enterprise Linux (v. 5.6.z server)",
"product_id": "5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64"
},
"product_reference": "postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"relates_to_product_reference": "5Server-5.6.Z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.src as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.src"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.src",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)",
"product_id": "6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.src as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.src"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.src",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"relates_to_product_reference": "6Server-optional-6.1.z"
},
{
"category": "default_component_of",
"full_product_name": {
"name": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64 as a component of Red Hat Enterprise Linux Server Optional (v. 6)",
"product_id": "6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64"
},
"product_reference": "postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"relates_to_product_reference": "6Server-optional-6.1.z"
}
]
},
"vulnerabilities": [
{
"acknowledgments": [
{
"names": [
"CERT/CC"
]
}
],
"cve": "CVE-2011-1720",
"discovery_date": "2011-04-20T00:00:00+00:00",
"ids": [
{
"system_name": "Red Hat Bugzilla ID",
"text": "699035"
}
],
"notes": [
{
"category": "description",
"text": "The SMTP server in Postfix before 2.5.13, 2.6.x before 2.6.10, 2.7.x before 2.7.4, and 2.8.x before 2.8.3, when certain Cyrus SASL authentication methods are enabled, does not create a new server handle after client authentication fails, which allows remote attackers to cause a denial of service (heap memory corruption and daemon crash) or possibly execute arbitrary code via an invalid AUTH command with one method followed by an AUTH command with a different method.",
"title": "Vulnerability description"
},
{
"category": "summary",
"text": "(smtpd): Crash due to improper management of SASL handlers for SMTP sessions",
"title": "Vulnerability summary"
},
{
"category": "general",
"text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.",
"title": "CVSS score applicability"
}
],
"product_status": {
"fixed": [
"4AS:postfix-2:2.2.10-1.5.el4.i386",
"4AS:postfix-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-2:2.2.10-1.5.el4.s390",
"4AS:postfix-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-2:2.2.10-1.5.el4.src",
"4AS:postfix-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-2:2.2.10-1.5.el4.src",
"4Desktop:postfix-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-2:2.2.10-1.5.el4.i386",
"4ES:postfix-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-2:2.2.10-1.5.el4.s390",
"4ES:postfix-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-2:2.2.10-1.5.el4.src",
"4ES:postfix-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-2:2.2.10-1.5.el4.i386",
"4WS:postfix-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-2:2.2.10-1.5.el4.s390",
"4WS:postfix-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-2:2.2.10-1.5.el4.src",
"4WS:postfix-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.src",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64"
]
},
"references": [
{
"category": "self",
"summary": "Canonical URL",
"url": "https://access.redhat.com/security/cve/CVE-2011-1720"
},
{
"category": "external",
"summary": "RHBZ#699035",
"url": "https://bugzilla.redhat.com/show_bug.cgi?id=699035"
},
{
"category": "external",
"summary": "https://www.cve.org/CVERecord?id=CVE-2011-1720",
"url": "https://www.cve.org/CVERecord?id=CVE-2011-1720"
},
{
"category": "external",
"summary": "https://nvd.nist.gov/vuln/detail/CVE-2011-1720",
"url": "https://nvd.nist.gov/vuln/detail/CVE-2011-1720"
}
],
"release_date": "2011-05-09T00:00:00+00:00",
"remediations": [
{
"category": "vendor_fix",
"date": "2011-05-31T15:35:00+00:00",
"details": "Before applying this update, make sure all previously-released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to\nuse the Red Hat Network to apply this update are available at\nhttps://access.redhat.com/kb/docs/DOC-11259",
"product_ids": [
"4AS:postfix-2:2.2.10-1.5.el4.i386",
"4AS:postfix-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-2:2.2.10-1.5.el4.s390",
"4AS:postfix-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-2:2.2.10-1.5.el4.src",
"4AS:postfix-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-2:2.2.10-1.5.el4.src",
"4Desktop:postfix-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-2:2.2.10-1.5.el4.i386",
"4ES:postfix-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-2:2.2.10-1.5.el4.s390",
"4ES:postfix-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-2:2.2.10-1.5.el4.src",
"4ES:postfix-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-2:2.2.10-1.5.el4.i386",
"4WS:postfix-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-2:2.2.10-1.5.el4.s390",
"4WS:postfix-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-2:2.2.10-1.5.el4.src",
"4WS:postfix-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.src",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64"
],
"restart_required": {
"category": "none"
},
"url": "https://access.redhat.com/errata/RHSA-2011:0843"
}
],
"scores": [
{
"cvss_v2": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "PARTIAL",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "NONE",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
"version": "2.0"
},
"products": [
"4AS:postfix-2:2.2.10-1.5.el4.i386",
"4AS:postfix-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-2:2.2.10-1.5.el4.s390",
"4AS:postfix-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-2:2.2.10-1.5.el4.src",
"4AS:postfix-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4AS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-2:2.2.10-1.5.el4.src",
"4Desktop:postfix-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4Desktop:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-2:2.2.10-1.5.el4.i386",
"4ES:postfix-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-2:2.2.10-1.5.el4.s390",
"4ES:postfix-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-2:2.2.10-1.5.el4.src",
"4ES:postfix-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4ES:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-2:2.2.10-1.5.el4.i386",
"4WS:postfix-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-2:2.2.10-1.5.el4.s390",
"4WS:postfix-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-2:2.2.10-1.5.el4.src",
"4WS:postfix-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.i386",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-debuginfo-2:2.2.10-1.5.el4.x86_64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.i386",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ia64",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.ppc",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.s390x",
"4WS:postfix-pflogsumm-2:2.2.10-1.5.el4.x86_64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.src",
"5Server-5.6.Z:postfix-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-debuginfo-2:2.3.3-2.3.el5_6.x86_64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.i386",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ia64",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.ppc",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.s390x",
"5Server-5.6.Z:postfix-pflogsumm-2:2.3.3-2.3.el5_6.x86_64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.src",
"6Server-optional-6.1.z:postfix-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-debuginfo-2:2.6.6-2.2.el6_1.x86_64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.i686",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.ppc64",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.s390x",
"6Server-optional-6.1.z:postfix-perl-scripts-2:2.6.6-2.2.el6_1.x86_64"
]
}
],
"threats": [
{
"category": "impact",
"details": "Moderate"
}
],
"title": "(smtpd): Crash due to improper management of SASL handlers for SMTP sessions"
}
]
}
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.