cve-2009-0569
Vulnerability from cvelistv5
Published
2009-02-13 01:00
Modified
2024-08-07 04:40
Severity ?
Summary
Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.
Impacted products
n/an/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T04:40:05.089Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "JVNDB-2009-000011",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVNDB",
              "x_transferred"
            ],
            "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html"
          },
          {
            "name": "becky-readreceipt-bo(48684)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48684"
          },
          {
            "name": "33892",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/33892"
          },
          {
            "name": "33756",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/33756"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.rimarts.jp/downloads/B2/Readme-e.txt"
          },
          {
            "name": "JVN#29641290",
            "tags": [
              "third-party-advisory",
              "x_refsource_JVN",
              "x_transferred"
            ],
            "url": "http://jvn.jp/en/jp/JVN29641290/index.html"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-02-12T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-08-07T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "JVNDB-2009-000011",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVNDB"
          ],
          "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html"
        },
        {
          "name": "becky-readreceipt-bo(48684)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48684"
        },
        {
          "name": "33892",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/33892"
        },
        {
          "name": "33756",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/33756"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.rimarts.jp/downloads/B2/Readme-e.txt"
        },
        {
          "name": "JVN#29641290",
          "tags": [
            "third-party-advisory",
            "x_refsource_JVN"
          ],
          "url": "http://jvn.jp/en/jp/JVN29641290/index.html"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-0569",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "JVNDB-2009-000011",
              "refsource": "JVNDB",
              "url": "http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html"
            },
            {
              "name": "becky-readreceipt-bo(48684)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/48684"
            },
            {
              "name": "33892",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/33892"
            },
            {
              "name": "33756",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/33756"
            },
            {
              "name": "http://www.rimarts.jp/downloads/B2/Readme-e.txt",
              "refsource": "CONFIRM",
              "url": "http://www.rimarts.jp/downloads/B2/Readme-e.txt"
            },
            {
              "name": "JVN#29641290",
              "refsource": "JVN",
              "url": "http://jvn.jp/en/jp/JVN29641290/index.html"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-0569",
    "datePublished": "2009-02-13T01:00:00",
    "dateReserved": "2009-02-12T00:00:00",
    "dateUpdated": "2024-08-07T04:40:05.089Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1",
  "meta": {
    "nvd": "{\"cve\":{\"id\":\"CVE-2009-0569\",\"sourceIdentifier\":\"cve@mitre.org\",\"published\":\"2009-02-13T01:30:00.377\",\"lastModified\":\"2025-04-09T00:30:58.490\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"Buffer overflow in Becky! Internet Mail 2.48.02 and earlier allows remote attackers to execute arbitrary code via a mail message with a crafted return receipt request.\"},{\"lang\":\"es\",\"value\":\"Desbordamiento de b\u00fafer en Becky!! Internet Mail v2.48.02 y anteriores, que permite a los atacantes remotos ejecutar arbitrariamente c\u00f3digo a trav\u00e9s de mensajes de correo electr\u00f3nico con una retorno manipulado de recepci\u00f3n de petici\u00f3n.\"}],\"metrics\":{\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:C/I:C/A:C\",\"baseScore\":9.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":8.6,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":true,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-119\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:*:*:*:*:*:*:*:*\",\"versionEndIncluding\":\"2.48.02\",\"matchCriteriaId\":\"35441657-9A1E-4A77-9536-81F367C47DA0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:1.26.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BFDF43FF-5C93-40EA-A5BD-128E1BC7BA32\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:1.26.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A62CEDC-A2A6-4FF6-98B4-5DD9D62CE998\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:1.26.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"80DC7CF9-2FB1-4F0F-82C0-A6A7AE375823\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C7BB83AC-D0DD-4482-A1A5-6C86C7B6714D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"645DB3EB-FE95-4FB3-8763-553ACB7E7F8E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ECB7CEFD-6E32-4335-9121-D406312A9B38\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7382D4FC-706A-4AE2-A05C-1D0B118EEB1A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.0.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF1880ED-7933-49F8-B343-C1C67B8A8FA9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A72B3497-5E28-4AD6-A862-6444DA8D6009\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F959DE4F-1340-473D-8D66-D5A5FAE5A149\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A822625-04C7-426B-84D9-0980E9FCE3C6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C638FBED-D830-4DC2-BE43-7CD7FE27BBFB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B0EF9A6-BB23-4C45-94E1-24B5D4505CA5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"809F7EC5-A7FE-47E2-8681-EF8DF204770B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4060C6A3-DE96-4EF8-87BB-65B0BE2E87AA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"11A74E8D-8938-4963-A514-928FCF8A06C4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.00.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21896C1E-9F29-4B27-A6E7-ACAFA53694A7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"29AAF319-B2B9-4CEF-ABAE-B8FE51723EF9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9055C591-40DE-429C-8F53-F1F6A1E421B9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D805188D-6F89-4E4F-845E-FFED2D979E50\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"675A7B36-A89F-4FB7-A5A9-16C510BF267D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"06615A8C-819F-43D8-913C-27B9EAE10F15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3CCFA543-A594-4D80-9EF5-EE4D3B918E37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D98208DF-E941-4016-A2A3-75EE4B94BF92\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"DA356BFC-31FF-4D69-A945-774E39EAD8FB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0415269F-2CDB-4E5D-8882-E8E90FCEF207\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AE2D14C1-C391-4C56-BDAC-09D0ED95F223\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AB6BD2D2-2AD7-4401-B7A4-D963408AF286\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.05.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D313111-5218-4EE9-8D23-B6C769CB2F45\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FE2F96BC-96B9-4996-AA37-724FD9166642\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.06.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B5476F50-5D15-4DC3-9385-FEA4977A2C43\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AF3D8D78-A47E-4E38-A64B-0FBAFBBFEF01\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.07.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4F435683-AD92-4A93-8348-788DCCF3F31D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.07.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B063DBDD-6DB1-4997-B026-3296A845A668\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.07.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8184A401-D0F6-46DC-9A90-88F161DC9035\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.07.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"00E06240-6F6F-48B3-8BDA-1B472714C851\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.08:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D847B935-0A83-4B69-954C-F96AE9561FFC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.08.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7F777BC3-020F-4FA5-8C5B-AF9A3B97E829\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.09:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0802E75B-0AA7-4292-AF8C-B33B0FD370B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.09.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1E1AD4FC-7ABD-49A4-96E4-0EFD05D0BDBB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7C0F5B41-293D-4B7F-A0EA-F010DF3F56FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.10.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"49633DD2-0CB2-40F4-B142-40FDB48E75E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.10.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01852229-2482-4643-ACB0-5FAC5B5EAF62\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.10.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C9D63EEF-89F4-41AF-973B-2B7C6FB71D8F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.10.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EAAA6ED-F4D1-4D99-A5DA-CCA2CB67E2FE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.11:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7BA5444C-0145-4A83-876A-37E078FF3690\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.11.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E053257F-987A-46C7-86EB-5AB7DDF625D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.11.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC95A4DB-9A6B-4655-B3C2-CFD661D860D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.12:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"77A44287-7780-4F7E-A42A-8C84651B8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.12.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4898613-F821-4775-B6D0-3D6B74498B97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.20:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5903530F-DD3A-408F-8849-7B99C62C7E40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.20.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"01B57218-DD5E-4C71-8FFB-2089C4EE0CFF\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.20.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BE465630-5DA4-4060-BFFA-C0041270861F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.20.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"FDD9D9AA-45F7-4D5B-8492-357B7AFA84FD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.20.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C99317BC-2B79-46EA-8CD5-75FA8F4876B8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.20.05:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E74BB72E-1FD5-4C8F-A444-1FAE385F46DE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.20.06:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"ACC52F17-5084-4B32-801F-89E1D2CA3109\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.20.07:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"114AFAE6-5736-4264-89C6-2DE0B0EBDDB8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.21:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"19C8F2E3-577C-4A57-B70A-AF3B6F42745E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.21.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2A2B9909-67E2-496A-BA72-8A52C9A28CF4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.21.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CEBB8734-733D-4B63-9C99-FDBD681CBA94\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.21.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"477567A2-3C3F-46A2-865C-36DE7E7B8E59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.21.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"08CDB46B-ABC0-4ABA-8D0A-9CFF0139359D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.22:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4054A3EE-8D3F-47B5-A92C-58D49B7C4DF5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.22.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8552BACC-B0D4-4BF2-82EF-241A7A1725CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.22.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A6D76CB5-C808-40B2-AD9B-4F62412B4EE6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.23:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23FDEC56-D1A9-46FF-9819-38E1264EC706\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.24:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C766094E-99A3-4844-86C0-FE24748FEB2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.24.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3D9AE3D9-9744-472F-8269-6467A1E51986\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.24.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"908A9307-2020-4984-BD90-B202B462B388\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.25:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8C613B75-DF83-4E98-9D34-9B0CEE40C5A2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.25.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5B1154A2-F41D-4BDC-9ED8-0FD1FBCBFD5E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.25.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D29E0FBF-F6E1-4352-8EE3-7772AFBC1FB7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.26:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4175B57-4513-4AFC-9E01-49EB99811188\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.27:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5AE8FC0-BC89-4615-A45B-40697BA82884\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.28:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"591C04BC-A493-49A5-B50D-0028323F9C2F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.28.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1128DB6B-E007-4EC5-980D-2EB57FFA2207\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.29:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"AFBC1EAA-D3BB-42C6-A46B-97EAA12035D3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.30:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"522FBEA4-456D-48B8-8F57-D0E0C7F64A18\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.30.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A5D0B203-4E36-4B44-B3DC-6C8297D5A219\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.30.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"23ACE386-34BC-487C-AED2-98205D533466\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.30.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6096EF9A-D8B9-4EA7-A8C0-B31212FD0222\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.30.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6BE4A278-AF8B-4838-9B30-B17E61D4C4EB\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.31.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B050938B-092F-4D65-A0E4-DEC3984D7D9D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.40.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F69BD985-3861-4ABB-91EE-F712BF045D30\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.40.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A0480A36-1D98-4B84-AED7-0F325CAD9B54\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.40.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"75438538-6D0A-44C1-B6C5-BF592104B5BC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.40.03:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6EEF4651-3E29-404C-808A-B4446C5F14E0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.40.04:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F5E9811A-E845-4241-A1D4-B0AF5A299DE1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.41.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"4C1B5D17-0CAC-45DE-BD74-3A34F765A609\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.42.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF3F133A-8118-44F8-A2BA-0CE0437B8460\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.43.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D9147D46-80A5-4284-A219-52F59A2B8512\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.44.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CF39DB9E-D32D-4905-A135-2D5038007F4D\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.45.00:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C03F7772-3FAC-4C11-8A81-248D0556E7F6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.45.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9D7C828B-625A-4CF5-A3F9-209D7B1DD896\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.45.02:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9FFD231B-8057-4FA3-BE48-84D6EA8DF72C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.46:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5FEC070C-B2A4-4D10-90C1-89F8C1576C0E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.47:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E4D57C3E-F2AF-47C6-836F-19761D55BD68\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.47.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"53F66197-CD50-4794-B200-532C23BC7732\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.48:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8B421DA1-3C58-4224-AC1B-685DC0AB1368\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:rimarts:becky\\\\!_internet_mail:2.48.01:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"768CB429-EE2E-4E3C-9051-3C6528A60BE8\"}]}]}],\"references\":[{\"url\":\"http://jvn.jp/en/jp/JVN29641290/index.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://secunia.com/advisories/33892\",\"source\":\"cve@mitre.org\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.rimarts.jp/downloads/B2/Readme-e.txt\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://www.securityfocus.com/bid/33756\",\"source\":\"cve@mitre.org\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/48684\",\"source\":\"cve@mitre.org\"},{\"url\":\"http://jvn.jp/en/jp/JVN29641290/index.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://jvndb.jvn.jp/ja/contents/2009/JVNDB-2009-000011.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://secunia.com/advisories/33892\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.rimarts.jp/downloads/B2/Readme-e.txt\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"http://www.securityfocus.com/bid/33756\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"},{\"url\":\"https://exchange.xforce.ibmcloud.com/vulnerabilities/48684\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\"}]}}"
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading...

Loading...

Loading...
  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.