FKIE_CVE-2011-2381
Vulnerability from fkie_nvd - Published: 2011-08-09 19:55 - Updated: 2025-04-11 00:51
Severity ?
Summary
CRLF injection vulnerability in Bugzilla 2.17.1 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3 allows remote attackers to inject arbitrary e-mail headers via an attachment description in a flagmail notification.
References
Impacted products
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BBCDA64F-C49A-4F5B-B285-4079D8E3A499",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.3:*:*:*:*:*:*:*",
"matchCriteriaId": "85ED3457-CC21-4DB3-931F-677F723E1B2A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.4:*:*:*:*:*:*:*",
"matchCriteriaId": "6C8711D3-55CF-4131-BBAC-6BE07068219F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.5:*:*:*:*:*:*:*",
"matchCriteriaId": "DF54FFA5-5177-46E6-9AFA-BA3345C16E8A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.6:*:*:*:*:*:*:*",
"matchCriteriaId": "69D7EA7C-B401-4F5A-AC08-2199DD117403",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.17.7:*:*:*:*:*:*:*",
"matchCriteriaId": "DC2DDC7C-CD2B-4597-A5E0-266A884958FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:*:*:*:*:*:*:*",
"matchCriteriaId": "DDB99B2D-CA05-4BC0-BCA4-9B94DF248333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc1:*:*:*:*:*:*",
"matchCriteriaId": "3635C0E9-2E43-4BAE-8267-2BB2F68B03BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc2:*:*:*:*:*:*",
"matchCriteriaId": "4869A709-AF79-49BD-A7D2-D48A8D79A085",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18:rc3:*:*:*:*:*:*",
"matchCriteriaId": "EAC72143-27C3-498F-AFAB-98AE043C0545",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BE5E8E72-D493-460D-B5A0-F90C291398A5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.2:*:*:*:*:*:*:*",
"matchCriteriaId": "04885D31-09F3-455F-A1A9-815E182ABCF9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F153300E-42CC-4BDD-88EC-E8A0ADB4E3B7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.4:*:*:*:*:*:*:*",
"matchCriteriaId": "92BCD546-2A50-4F43-935C-B68459EE894E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C535BAB7-6146-440B-ADBD-51007585CFC8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.18.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7B6BA7E8-DEC7-4D94-B9F9-B70EC39FD892",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19:*:*:*:*:*:*:*",
"matchCriteriaId": "725BD7BE-1769-4032-ADA8-9ED15528C770",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.1:*:*:*:*:*:*:*",
"matchCriteriaId": "239D70F4-7D86-4A57-ACEF-440F68994FB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.2:*:*:*:*:*:*:*",
"matchCriteriaId": "ABEE2C94-DA69-4A78-A15F-538383A7460E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.19.3:*:*:*:*:*:*:*",
"matchCriteriaId": "4F7CD64E-7FAA-40DC-B36E-8B7EB9D620FB",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:*:*:*:*:*:*:*",
"matchCriteriaId": "A749C7AB-6F60-469C-BD95-759205DDA345",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc1:*:*:*:*:*:*",
"matchCriteriaId": "B45F6C27-D89A-42A0-A304-5B0C57D2A9F1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20:rc2:*:*:*:*:*:*",
"matchCriteriaId": "196B7CD8-D721-4CFB-B126-78758128E900",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BEA9DE63-9951-4FE0-80BE-0F6F197303D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.2:*:*:*:*:*:*:*",
"matchCriteriaId": "B0CEDD02-1CB8-4D5B-B82B-E300B4E39065",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.3:*:*:*:*:*:*:*",
"matchCriteriaId": "8E27101B-7985-4412-A14F-9ED11E4C874C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.4:*:*:*:*:*:*:*",
"matchCriteriaId": "8A74E8A2-223E-4877-989E-494362B513E9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.5:*:*:*:*:*:*:*",
"matchCriteriaId": "E0CAFB45-B115-4492-9919-60223304BB27",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.6:*:*:*:*:*:*:*",
"matchCriteriaId": "DC3F7C44-C734-419B-AB62-3AD52554FC7D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.20.7:*:*:*:*:*:*:*",
"matchCriteriaId": "695036D1-994C-451E-8D53-0A345702E4D1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21:*:*:*:*:*:*:*",
"matchCriteriaId": "2053CFB4-602E-4141-BB3D-A440E2A31D85",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.1:*:*:*:*:*:*:*",
"matchCriteriaId": "31ACBA13-AC13-4469-862F-B3DD2327B6FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.21.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9E9EC243-3E25-4234-A88A-FDD5B594BFBA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:*:*:*:*:*:*:*",
"matchCriteriaId": "F2969731-8256-431B-9356-4BC873D98F6D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22:rc1:*:*:*:*:*:*",
"matchCriteriaId": "1C166E42-9B36-4883-B738-EEBEF3056D98",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.1:*:*:*:*:*:*:*",
"matchCriteriaId": "E5177876-0FEC-481B-815F-84AF53968644",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.2:*:*:*:*:*:*:*",
"matchCriteriaId": "BC38566A-07F1-4F21-BAC1-259F844DC15C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.3:*:*:*:*:*:*:*",
"matchCriteriaId": "AE1684B8-3060-4139-BC06-707F27A05958",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.4:*:*:*:*:*:*:*",
"matchCriteriaId": "FF32C74C-3EA3-4E1F-BADA-BB4A92068266",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.5:*:*:*:*:*:*:*",
"matchCriteriaId": "D569A750-C649-4D40-89AB-D29773E66F66",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.6:*:*:*:*:*:*:*",
"matchCriteriaId": "95B69FA8-1182-46F1-952F-4610288ED409",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:2.22.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5716BB97-7829-4FDE-92AC-69CA10332F45",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "D6A71919-DC70-4AE2-9D16-76A177DAE331",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4:rc1:*:*:*:*:*:*",
"matchCriteriaId": "780896D3-3B49-486F-A136-D3D175C00A34",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "EA43E47B-F474-4F5B-A91B-9AF99359FE5F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.2:*:*:*:*:*:*:*",
"matchCriteriaId": "A7A3A453-EE50-458C-8F31-D7AA232006FC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.3:*:*:*:*:*:*:*",
"matchCriteriaId": "3D920D39-683D-4F9F-AA85-3C4D1600DAD6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.4:*:*:*:*:*:*:*",
"matchCriteriaId": "E7A4F1FD-2B00-4A99-AAA1-DBBFE3748D87",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EF6A3C0F-8778-4236-B4DC-41DBCF43EB62",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7D134D4D-6A95-48FE-B8E5-4F90692CB4FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.7:*:*:*:*:*:*:*",
"matchCriteriaId": "08C34E6F-8233-4575-AAE7-4DBFC27453F8",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.8:*:*:*:*:*:*:*",
"matchCriteriaId": "6D8155F8-CAB1-4EED-B576-F4102253BD25",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.9:*:*:*:*:*:*:*",
"matchCriteriaId": "593D2F3B-A386-48D8-BF19-A12F1B4962A6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.10:*:*:*:*:*:*:*",
"matchCriteriaId": "F37C651D-8989-478B-A991-654FCDEC8B1D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.4.11:*:*:*:*:*:*:*",
"matchCriteriaId": "AE170AE5-37F5-4750-ACD9-13CA691A80C5",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "850ADB66-21F2-49CB-B105-BDA16A286CFC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "1907D4D0-9D6E-476E-BD1A-88A32D3EFE38",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "61DD0779-786E-4714-AA73-86FB19E26028",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "A8E8DD97-5799-465D-8B99-F2BD6AA681AB",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "03E40C09-0696-45BC-9AE8-9F6F20964600",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6:rc1:*:*:*:*:*:*",
"matchCriteriaId": "397E07B5-3D9D-44C7-B8B3-18D04EE84405",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.0:*:*:*:*:*:*:*",
"matchCriteriaId": "4A1AD503-7F78-4597-AECD-6DC530AD4D3C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.1:*:*:*:*:*:*:*",
"matchCriteriaId": "BCAD5285-E485-4F49-99CF-287545260FDD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5C193DF3-8D23-44A9-94DE-9F4F7358ED3F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.3:*:*:*:*:*:*:*",
"matchCriteriaId": "80BA8C84-32C3-4ECF-B4C7-573B12441D22",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.4:*:*:*:*:*:*:*",
"matchCriteriaId": "820EC9F1-B66C-43CE-B254-145F4AC23083",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.6.5:*:*:*:*:*:*:*",
"matchCriteriaId": "C4BDA6DC-8D53-417D-8320-CE266F8607B7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "2757B2A7-5232-4245-9CC6-91BF9E3ECA09",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.1:*:*:*:*:*:*:*",
"matchCriteriaId": "740ADCB7-B296-4728-A73A-9691265B8F07",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.2:*:*:*:*:*:*:*",
"matchCriteriaId": "6187C92D-FEE9-4B1B-B7ED-9A1DD360B204",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.7.3:*:*:*:*:*:*:*",
"matchCriteriaId": "71213AF6-48CC-469F-9FBA-CAF1D3237657",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:*:*:*:*:*:*:*",
"matchCriteriaId": "DABC1683-0E04-456E-9500-68D0D35815E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "38D71912-DCD6-44BB-8A86-72D207B49E58",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0:rc2:*:*:*:*:*:*",
"matchCriteriaId": "D5A8816A-84EE-44B0-AD3B-5C9BC9B3E71E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "A367BFF0-397D-416F-960C-602E8B66421A",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1:*:*:*:*:*:*:*",
"matchCriteriaId": "85CDC579-6967-4E5C-B716-B2BC04F6DBF2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "27783033-F558-427C-89A7-C3638C57F2A0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:4.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "E91557C7-8C53-49C4-8BC5-7F86D4AA09B8",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
},
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "D4D9F54A-15A7-4899-B695-D9D8B96C4A9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0:rc1:*:*:*:*:*:*",
"matchCriteriaId": "BD56D9C0-38C6-4679-8104-1A0B88B71C0E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.0:*:*:*:*:*:*:*",
"matchCriteriaId": "45C36666-518F-4956-816A-940930425955",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "FF2DF96F-E45E-45AF-85E5-E939F923EC1B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "80EBAA09-F2C8-445E-8E3A-B5F937E1B1E2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "11C6713F-01ED-4AE9-AE42-89926067E6E6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7AB5010D-37A3-4B6E-92B6-6F41A3708851",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "EEB09719-122F-4D25-B680-18029D5D9DE9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "AF585D92-9FAF-4858-A956-68AF77227333",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "7BA67823-C9D9-4C5B-A4ED-669E6F1851C0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CB0F7531-A660-4604-80BD-15B01E2916BD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "A6FE6868-BB9F-4EB8-9E37-3438559CB01B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "1EC90352-C94A-4F47-AFB7-713B547373CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.0.11:*:*:*:*:*:*:*",
"matchCriteriaId": "E5E77E01-D779-482A-9FAC-4AC210B68771",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "154EA18F-534C-4095-837D-BB9865D25F23",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.1:*:*:*:*:*:*:*",
"matchCriteriaId": "585F05F2-B294-4218-9209-C487B4D2994B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F3246890-8D66-474F-AC9C-BC556426467D",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7090332F-4CC2-4ADD-AEEC-75238BCA55CC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.1.4:*:*:*:*:*:*:*",
"matchCriteriaId": "F960BE59-05B1-4438-A854-279612E13A7B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "F248EA4D-1A39-40FD-8D3C-9701D36FD6B1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc1:*:*:*:*:*:*",
"matchCriteriaId": "170EB43B-9488-4E25-9401-B84DE838247B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2:rc2:*:*:*:*:*:*",
"matchCriteriaId": "B1ED7682-A315-4F92-9F9F-38290BCC058E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "14B5A433-526F-436E-9FCD-B71E661180FD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "48EDC5BC-AD4B-4E67-B79C-F44292307AB4",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "6FEC62B7-2CAA-4A0D-A9B2-B4A6B105A6F7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "4B4A7A67-1355-4648-B8C9-3231BED96547",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "442AB3EE-61DF-4B25-ABEB-55905C01E376",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "7F825E34-D529-4ADC-A7D6-1BD9DAE86FC1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "C1F92D0C-AF71-4FD3-BC4B-C6D0F1F84F9B",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "CBC26020-BFD7-493B-BDE2-1EC8DEA1A6DA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "984463B4-00A8-423B-B0C5-A7C4FECF064C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.2.10:*:*:*:*:*:*:*",
"matchCriteriaId": "6C7DC534-FF77-414C-A1DC-945F508CC3C9",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "BEB4EF1D-D4D0-40DA-BE78-24FD48030EE0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2962084-F778-4574-8105-8C5A260CCBD7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "FF288A74-070E-4EB4-BB92-7D4D41635DD1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "5B8B31F0-6FCC-4258-865B-B65ECBFAF252",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:mozilla:bugzilla:3.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "7A0CCF96-777F-4CEE-BC04-2974663CF5E7",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "CRLF injection vulnerability in Bugzilla 2.17.1 through 2.22.7, 3.0.x through 3.3.x, 3.4.x before 3.4.12, 3.5.x, 3.6.x before 3.6.6, 3.7.x, 4.0.x before 4.0.2, and 4.1.x before 4.1.3 allows remote attackers to inject arbitrary e-mail headers via an attachment description in a flagmail notification."
},
{
"lang": "es",
"value": "Vulnerabilidad de inyecci\u00f3n CRLF (Carriage Return - Line Feed) en Bugzilla 2.17.1 hasta la versi\u00f3n 2.22.7, 3.0.x hasta la 3.3.x, 3.4.x anteriores a 3.4.12, 3.5.x, 3.6.x anteriores a 3.6.6, 3.7.x, 4.0.x anteriores a 4.0.2, y 4.1.x anteriores a 4.1.3 permite a atacantes remotos ineyectar cabeceras de e-mail arbitrarias a trav\u00e9s de una descripci\u00f3n de adjunto en una notificaci\u00f3n flagmail."
}
],
"id": "CVE-2011-2381",
"lastModified": "2025-04-11T00:51:21.963",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
]
},
"published": "2011-08-09T19:55:01.527",
"references": [
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45501"
},
{
"source": "cve@mitre.org",
"tags": [
"Vendor Advisory"
],
"url": "http://www.bugzilla.org/security/3.4.11/"
},
{
"source": "cve@mitre.org",
"url": "http://www.debian.org/security/2011/dsa-2322"
},
{
"source": "cve@mitre.org",
"url": "http://www.osvdb.org/74300"
},
{
"source": "cve@mitre.org",
"url": "http://www.securityfocus.com/bid/49042"
},
{
"source": "cve@mitre.org",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=657158"
},
{
"source": "cve@mitre.org",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69035"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://secunia.com/advisories/45501"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "http://www.bugzilla.org/security/3.4.11/"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.debian.org/security/2011/dsa-2322"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.osvdb.org/74300"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "http://www.securityfocus.com/bid/49042"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Patch"
],
"url": "https://bugzilla.mozilla.org/show_bug.cgi?id=657158"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69035"
}
],
"sourceIdentifier": "cve@mitre.org",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-94"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…