Vulnerabilites related to double_precision_incorporated - courier_mta
Vulnerability from fkie_nvd
Published
2004-04-15 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code "when Unicode character is out of BMP range."



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "59676325-66F3-42EA-935B-1436961E3B50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.43.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A801771F-0CBF-40DC-91F2-D4C885B28FD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.43.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2464DEE-21EF-40B6-A691-6B8A89DED2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA66C89A-F87F-4854-A358-2E8377DD431D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.44.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "2D580A21-C0E9-40F1-ADC2-0DD17D51909B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:sqwebmail:3.5.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "49F81672-03E5-4F7A-91B9-5CA22F97DEA7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:sqwebmail:3.5.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "F19F4FF8-5736-40E5-9B77-1239EC32E4A1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:sqwebmail:3.6.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "4F34BDC5-1BB5-42B5-A69F-A3B4C2F4A0EA",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:sqwebmail:3.6.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "714A150C-6D9D-4A31-958D-F1A1EBE4F3A9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:sqwebmail:3.6_.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D4E759B1-C7FF-447A-882D-7F9C8D35D744",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:inter7:courier-imap:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE124EB9-DA25-459A-83A2-43E8A0AC0EF7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:inter7:courier-imap:1.7:*:*:*:*:*:*:*",
              "matchCriteriaId": "6A41204F-5DF0-48C3-A6EA-BEB9F16AD819",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:inter7:courier-imap:2.0.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2EEAB62-A508-4138-8633-9EC55FA9BA70",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:inter7:courier-imap:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FB2AC82C-77EE-4FF1-BFCB-F3C05FE7D77D",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:inter7:courier-imap:2.1.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "1CBF3328-97BF-4C82-B99A-1C0C55E63716",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:inter7:courier-imap:2.1.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "C2C8E71C-8CD0-491F-9531-EBB909F540BE",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:inter7:courier-imap:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "4EE24695-FA49-4323-8A57-E4E618FAD45E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:inter7:courier-imap:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "803700EC-E4E9-45DB-9024-4FDE322BB783",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    },
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:o:gentoo:linux:1.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "65ED9D8C-604D-4B0B-A192-C0DA4D2E9AEB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "D1FD0EB4-E744-4465-AFEE-A3C807C9C993",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "57772E3B-893C-408A-AA3B-78C972ED4D5E",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code \"when Unicode character is out of BMP range.\""
    },
    {
      "lang": "es",
      "value": "M\u00faltiples desobordamientos de b\u00fafer en (1) iso2022jp.c o (2) shiftjis.c  de Courier-IMAP anteriores a 3.0.0, Courier anteriores a 0.45, y SQWebMail anteriores a 4.0.0 pueden permitir a atacantes remotos ejecutar c\u00f3digo arbitrario \"cuando el car\u00e1cter Unicode est\u00e1 fuera de rango BMP\"."
    }
  ],
  "id": "CVE-2004-0224",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2004-04-15T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/11087/"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=5767"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9845"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15434"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/11087/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://sourceforge.net/project/shownotes.php?release_id=5767"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/9845"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15434"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2006-05-30 19:02
Modified
2025-04-03 01:03
Severity ?
Summary
libs/comverp.c in Courier MTA before 0.53.2 allows attackers to cause a denial of service (CPU consumption) via unknown vectors involving usernames that contain the "=" (equals) character, which is not properly handled during encoding.
References
cve@mitre.orghttp://bugs.debian.org/cgi-bin/bugreport.cgi?bug=368834Patch
cve@mitre.orghttp://secunia.com/advisories/20519
cve@mitre.orghttp://secunia.com/advisories/20548
cve@mitre.orghttp://secunia.com/advisories/20792
cve@mitre.orghttp://secunia.com/advisories/21350
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200608-06.xml
cve@mitre.orghttp://securitytracker.com/id?1016248
cve@mitre.orghttp://www.courier-mta.org/beta/patches/verp-fix/README.txtPatch
cve@mitre.orghttp://www.debian.org/security/2006/dsa-1101
cve@mitre.orghttp://www.securityfocus.com/bid/18345
cve@mitre.orghttp://www.vupen.com/english/advisories/2006/2214
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/26998
cve@mitre.orghttps://usn.ubuntu.com/294-1/
af854a3a-2127-422b-91ae-364da2661108http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=368834Patch
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20519
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20548
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/20792
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/21350
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200608-06.xml
af854a3a-2127-422b-91ae-364da2661108http://securitytracker.com/id?1016248
af854a3a-2127-422b-91ae-364da2661108http://www.courier-mta.org/beta/patches/verp-fix/README.txtPatch
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2006/dsa-1101
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/18345
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2006/2214
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/26998
af854a3a-2127-422b-91ae-364da2661108https://usn.ubuntu.com/294-1/



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "5F80A7EC-ACB8-4768-9132-A8514B317AFB",
              "versionEndIncluding": "0.44.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.37.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0869BB9-5308-406D-9107-EFAF25BCF96E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.38.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAF5F93E-53A5-4A27-8563-14C41FA6A6E6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF57BA8C-A955-4C50-B9CF-863CF056E0A4",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.43:*:*:*:*:*:*:*",
              "matchCriteriaId": "59676325-66F3-42EA-935B-1436961E3B50",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.43.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "A801771F-0CBF-40DC-91F2-D4C885B28FD2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.43.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "D2464DEE-21EF-40B6-A691-6B8A89DED2B8",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.44:*:*:*:*:*:*:*",
              "matchCriteriaId": "CA66C89A-F87F-4854-A358-2E8377DD431D",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "libs/comverp.c in Courier MTA before 0.53.2 allows attackers to cause a denial of service (CPU consumption) via unknown vectors involving usernames that contain the \"=\" (equals) character, which is not properly handled during encoding."
    }
  ],
  "evaluatorSolution": "This vulnerability is addressed in the following product release:\r\nDouble Precision Incorporated, Courier MTA, 0.53.2",
  "id": "CVE-2006-2659",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "COMPLETE",
          "baseScore": 7.8,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2006-05-30T19:02:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=368834"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20519"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20548"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/20792"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/21350"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200608-06.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securitytracker.com/id?1016248"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.courier-mta.org/beta/patches/verp-fix/README.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2006/dsa-1101"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/18345"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2006/2214"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26998"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://usn.ubuntu.com/294-1/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=368834"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20519"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20548"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/20792"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/21350"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200608-06.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securitytracker.com/id?1016248"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.courier-mta.org/beta/patches/verp-fix/README.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2006/dsa-1101"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/18345"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2006/2214"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26998"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://usn.ubuntu.com/294-1/"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-11-29 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
Courier sqwebmail before 0.40.0 does not quickly drop privileges after startup in certain cases, which could allow local users to read arbitrary files.
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.37.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0869BB9-5308-406D-9107-EFAF25BCF96E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.40:*:*:*:*:*:*:*",
              "matchCriteriaId": "EF57BA8C-A955-4C50-B9CF-863CF056E0A4",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Courier sqwebmail before 0.40.0 does not quickly drop privileges after startup in certain cases, which could allow local users to read arbitrary files."
    },
    {
      "lang": "es",
      "value": "Courier sqwebmail antes de 0.40.0 no deja privilegios r\u00e1pidamente despues del inicio, lo que podr\u00eda permitir a usuarios locales leer ficheros arbitrarios."
    }
  ],
  "id": "CVE-2002-1311",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "LOCAL",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.6,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 3.9,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": true,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-11-29T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://marc.info/?l=bugtraq\u0026m=103794021013436\u0026w=2"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2002/dsa-197"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/10643.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/6189"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://marc.info/?l=bugtraq\u0026m=103794021013436\u0026w=2"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2002/dsa-197"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/10643.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/6189"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2003-02-19 05:00
Modified
2025-04-03 01:03
Severity ?
Summary
SQL injection vulnerability in the PostgreSQL auth module for courier 0.40 and earlier allows remote attackers to execute SQL code via the user name.
Impacted products
Vendor Product Version
double_precision_incorporated courier_mta 0.37.3
inter7 courier-imap 1.6



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.37.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "A0869BB9-5308-406D-9107-EFAF25BCF96E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:inter7:courier-imap:1.6:*:*:*:*:*:*:*",
              "matchCriteriaId": "CE124EB9-DA25-459A-83A2-43E8A0AC0EF7",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "SQL injection vulnerability in the PostgreSQL auth module for courier 0.40 and earlier allows remote attackers to execute SQL code via the user name."
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad de inyecci\u00f3n de SQL en m\u00f3dulo auth de PostgreSQL en courier 0.40 y anteriores permite a atacantes remotos ejecutar c\u00f3digo SQL mediante el nombre de usuario."
    }
  ],
  "id": "CVE-2003-0040",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": true,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2003-02-19T05:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2003/dsa-247"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/6738"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11213"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.debian.org/security/2003/dsa-247"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/6738"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11213"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2002-10-04 04:00
Modified
2025-04-03 01:03
Severity ?
Summary
Double Precision Courier e-mail MTA allows remote attackers to cause a denial of service (CPU consumption) via a message with an extremely large or negative value for the year, which causes a tight loop.
Impacted products
Vendor Product Version
double_precision_incorporated courier_mta 0.38.1



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:double_precision_incorporated:courier_mta:0.38.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "FAF5F93E-53A5-4A27-8563-14C41FA6A6E6",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Double Precision Courier e-mail MTA allows remote attackers to cause a denial of service (CPU consumption) via a message with an extremely large or negative value for the year, which causes a tight loop."
    }
  ],
  "id": "CVE-2002-0914",
  "lastModified": "2025-04-03T01:03:51.193",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 5.0,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2002-10-04T04:00:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=93065"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/9228.php"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.osvdb.org/5052"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4908"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=93065"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://www.iss.net/security_center/static/9228.php"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.osvdb.org/5052"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://www.securityfocus.com/bid/4908"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Deferred",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

CVE-2006-2659 (GCVE-0-2006-2659)
Vulnerability from cvelistv5
Published
2006-05-30 19:00
Modified
2024-08-07 17:58
Severity ?
CWE
  • n/a
Summary
libs/comverp.c in Courier MTA before 0.53.2 allows attackers to cause a denial of service (CPU consumption) via unknown vectors involving usernames that contain the "=" (equals) character, which is not properly handled during encoding.
References
http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=368834 x_refsource_CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/26998 vdb-entry, x_refsource_XF
http://security.gentoo.org/glsa/glsa-200608-06.xml vendor-advisory, x_refsource_GENTOO
http://www.securityfocus.com/bid/18345 vdb-entry, x_refsource_BID
http://secunia.com/advisories/20548 third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/20519 third-party-advisory, x_refsource_SECUNIA
http://www.courier-mta.org/beta/patches/verp-fix/README.txt x_refsource_CONFIRM
http://secunia.com/advisories/21350 third-party-advisory, x_refsource_SECUNIA
http://www.debian.org/security/2006/dsa-1101 vendor-advisory, x_refsource_DEBIAN
http://www.vupen.com/english/advisories/2006/2214 vdb-entry, x_refsource_VUPEN
https://usn.ubuntu.com/294-1/ vendor-advisory, x_refsource_UBUNTU
http://secunia.com/advisories/20792 third-party-advisory, x_refsource_SECUNIA
http://securitytracker.com/id?1016248 vdb-entry, x_refsource_SECTRACK
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T17:58:51.858Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=368834"
          },
          {
            "name": "courier-usernames-dos(26998)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26998"
          },
          {
            "name": "GLSA-200608-06",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200608-06.xml"
          },
          {
            "name": "18345",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/18345"
          },
          {
            "name": "20548",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20548"
          },
          {
            "name": "20519",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20519"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://www.courier-mta.org/beta/patches/verp-fix/README.txt"
          },
          {
            "name": "21350",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/21350"
          },
          {
            "name": "DSA-1101",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2006/dsa-1101"
          },
          {
            "name": "ADV-2006-2214",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2006/2214"
          },
          {
            "name": "USN-294-1",
            "tags": [
              "vendor-advisory",
              "x_refsource_UBUNTU",
              "x_transferred"
            ],
            "url": "https://usn.ubuntu.com/294-1/"
          },
          {
            "name": "20792",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/20792"
          },
          {
            "name": "1016248",
            "tags": [
              "vdb-entry",
              "x_refsource_SECTRACK",
              "x_transferred"
            ],
            "url": "http://securitytracker.com/id?1016248"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2006-05-25T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "libs/comverp.c in Courier MTA before 0.53.2 allows attackers to cause a denial of service (CPU consumption) via unknown vectors involving usernames that contain the \"=\" (equals) character, which is not properly handled during encoding."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2018-10-03T20:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=368834"
        },
        {
          "name": "courier-usernames-dos(26998)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26998"
        },
        {
          "name": "GLSA-200608-06",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200608-06.xml"
        },
        {
          "name": "18345",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/18345"
        },
        {
          "name": "20548",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20548"
        },
        {
          "name": "20519",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20519"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://www.courier-mta.org/beta/patches/verp-fix/README.txt"
        },
        {
          "name": "21350",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/21350"
        },
        {
          "name": "DSA-1101",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2006/dsa-1101"
        },
        {
          "name": "ADV-2006-2214",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2006/2214"
        },
        {
          "name": "USN-294-1",
          "tags": [
            "vendor-advisory",
            "x_refsource_UBUNTU"
          ],
          "url": "https://usn.ubuntu.com/294-1/"
        },
        {
          "name": "20792",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/20792"
        },
        {
          "name": "1016248",
          "tags": [
            "vdb-entry",
            "x_refsource_SECTRACK"
          ],
          "url": "http://securitytracker.com/id?1016248"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2006-2659",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "libs/comverp.c in Courier MTA before 0.53.2 allows attackers to cause a denial of service (CPU consumption) via unknown vectors involving usernames that contain the \"=\" (equals) character, which is not properly handled during encoding."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=368834",
              "refsource": "CONFIRM",
              "url": "http://bugs.debian.org/cgi-bin/bugreport.cgi?bug=368834"
            },
            {
              "name": "courier-usernames-dos(26998)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/26998"
            },
            {
              "name": "GLSA-200608-06",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200608-06.xml"
            },
            {
              "name": "18345",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/18345"
            },
            {
              "name": "20548",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20548"
            },
            {
              "name": "20519",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20519"
            },
            {
              "name": "http://www.courier-mta.org/beta/patches/verp-fix/README.txt",
              "refsource": "CONFIRM",
              "url": "http://www.courier-mta.org/beta/patches/verp-fix/README.txt"
            },
            {
              "name": "21350",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/21350"
            },
            {
              "name": "DSA-1101",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2006/dsa-1101"
            },
            {
              "name": "ADV-2006-2214",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2006/2214"
            },
            {
              "name": "USN-294-1",
              "refsource": "UBUNTU",
              "url": "https://usn.ubuntu.com/294-1/"
            },
            {
              "name": "20792",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/20792"
            },
            {
              "name": "1016248",
              "refsource": "SECTRACK",
              "url": "http://securitytracker.com/id?1016248"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2006-2659",
    "datePublished": "2006-05-30T19:00:00",
    "dateReserved": "2006-05-30T00:00:00",
    "dateUpdated": "2024-08-07T17:58:51.858Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2004-0224 (GCVE-0-2004-0224)
Vulnerability from cvelistv5
Published
2004-03-16 05:00
Modified
2024-08-08 00:10
Severity ?
CWE
  • n/a
Summary
Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code "when Unicode character is out of BMP range."
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T00:10:03.739Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=5767"
          },
          {
            "name": "courier-codeset-converter-bo(15434)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15434"
          },
          {
            "name": "11087",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/11087/"
          },
          {
            "name": "9845",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/9845"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2004-03-11T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code \"when Unicode character is out of BMP range.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-10T14:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=5767"
        },
        {
          "name": "courier-codeset-converter-bo(15434)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15434"
        },
        {
          "name": "11087",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/11087/"
        },
        {
          "name": "9845",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/9845"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2004-0224",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Multiple buffer overflows in (1) iso2022jp.c or (2) shiftjis.c for Courier-IMAP before 3.0.0, Courier before 0.45, and SqWebMail before 4.0.0 may allow remote attackers to execute arbitrary code \"when Unicode character is out of BMP range.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=5767",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=5767"
            },
            {
              "name": "courier-codeset-converter-bo(15434)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15434"
            },
            {
              "name": "11087",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/11087/"
            },
            {
              "name": "9845",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/9845"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2004-0224",
    "datePublished": "2004-03-16T05:00:00",
    "dateReserved": "2004-03-15T00:00:00",
    "dateUpdated": "2024-08-08T00:10:03.739Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-1311 (GCVE-0-2002-1311)
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 03:19
Severity ?
CWE
  • n/a
Summary
Courier sqwebmail before 0.40.0 does not quickly drop privileges after startup in certain cases, which could allow local users to read arbitrary files.
References
http://www.iss.net/security_center/static/10643.php vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/6189 vdb-entry, x_refsource_BID
http://www.debian.org/security/2002/dsa-197 vendor-advisory, x_refsource_DEBIAN
http://marc.info/?l=bugtraq&m=103794021013436&w=2 mailing-list, x_refsource_BUGTRAQ
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:19:28.573Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "courier-mta-insecure-permissions(10643)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/10643.php"
          },
          {
            "name": "6189",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/6189"
          },
          {
            "name": "DSA-197",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2002/dsa-197"
          },
          {
            "name": "20021119 GLSA: courier",
            "tags": [
              "mailing-list",
              "x_refsource_BUGTRAQ",
              "x_transferred"
            ],
            "url": "http://marc.info/?l=bugtraq\u0026m=103794021013436\u0026w=2"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-11-15T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Courier sqwebmail before 0.40.0 does not quickly drop privileges after startup in certain cases, which could allow local users to read arbitrary files."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-10-16T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "courier-mta-insecure-permissions(10643)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/10643.php"
        },
        {
          "name": "6189",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/6189"
        },
        {
          "name": "DSA-197",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2002/dsa-197"
        },
        {
          "name": "20021119 GLSA: courier",
          "tags": [
            "mailing-list",
            "x_refsource_BUGTRAQ"
          ],
          "url": "http://marc.info/?l=bugtraq\u0026m=103794021013436\u0026w=2"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-1311",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Courier sqwebmail before 0.40.0 does not quickly drop privileges after startup in certain cases, which could allow local users to read arbitrary files."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "courier-mta-insecure-permissions(10643)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/10643.php"
            },
            {
              "name": "6189",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/6189"
            },
            {
              "name": "DSA-197",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2002/dsa-197"
            },
            {
              "name": "20021119 GLSA: courier",
              "refsource": "BUGTRAQ",
              "url": "http://marc.info/?l=bugtraq\u0026m=103794021013436\u0026w=2"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-1311",
    "datePublished": "2004-09-01T04:00:00",
    "dateReserved": "2002-11-16T00:00:00",
    "dateUpdated": "2024-08-08T03:19:28.573Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2002-0914 (GCVE-0-2002-0914)
Vulnerability from cvelistv5
Published
2003-04-02 05:00
Modified
2024-08-08 03:03
Severity ?
CWE
  • n/a
Summary
Double Precision Courier e-mail MTA allows remote attackers to cause a denial of service (CPU consumption) via a message with an extremely large or negative value for the year, which causes a tight loop.
References
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T03:03:49.303Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "courier-mta-year-dos(9228)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "http://www.iss.net/security_center/static/9228.php"
          },
          {
            "name": "5052",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://www.osvdb.org/5052"
          },
          {
            "name": "4908",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/4908"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=93065"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2002-06-01T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Double Precision Courier e-mail MTA allows remote attackers to cause a denial of service (CPU consumption) via a message with an extremely large or negative value for the year, which causes a tight loop."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2002-09-10T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "courier-mta-year-dos(9228)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "http://www.iss.net/security_center/static/9228.php"
        },
        {
          "name": "5052",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://www.osvdb.org/5052"
        },
        {
          "name": "4908",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/4908"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=93065"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2002-0914",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Double Precision Courier e-mail MTA allows remote attackers to cause a denial of service (CPU consumption) via a message with an extremely large or negative value for the year, which causes a tight loop."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "courier-mta-year-dos(9228)",
              "refsource": "XF",
              "url": "http://www.iss.net/security_center/static/9228.php"
            },
            {
              "name": "5052",
              "refsource": "OSVDB",
              "url": "http://www.osvdb.org/5052"
            },
            {
              "name": "4908",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/4908"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=93065",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=93065"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2002-0914",
    "datePublished": "2003-04-02T05:00:00",
    "dateReserved": "2002-08-16T00:00:00",
    "dateUpdated": "2024-08-08T03:03:49.303Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

CVE-2003-0040 (GCVE-0-2003-0040)
Vulnerability from cvelistv5
Published
2004-09-01 04:00
Modified
2024-08-08 01:43
Severity ?
CWE
  • n/a
Summary
SQL injection vulnerability in the PostgreSQL auth module for courier 0.40 and earlier allows remote attackers to execute SQL code via the user name.
References
http://www.debian.org/security/2003/dsa-247 vendor-advisory, x_refsource_DEBIAN
https://exchange.xforce.ibmcloud.com/vulnerabilities/11213 vdb-entry, x_refsource_XF
http://www.securityfocus.com/bid/6738 vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-08T01:43:34.900Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "DSA-247",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2003/dsa-247"
          },
          {
            "name": "courierimap-authmysqllib-sql-injection(11213)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11213"
          },
          {
            "name": "6738",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/6738"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2003-01-30T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "SQL injection vulnerability in the PostgreSQL auth module for courier 0.40 and earlier allows remote attackers to execute SQL code via the user name."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2007-11-13T00:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "DSA-247",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2003/dsa-247"
        },
        {
          "name": "courierimap-authmysqllib-sql-injection(11213)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11213"
        },
        {
          "name": "6738",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/6738"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2003-0040",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "SQL injection vulnerability in the PostgreSQL auth module for courier 0.40 and earlier allows remote attackers to execute SQL code via the user name."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "DSA-247",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2003/dsa-247"
            },
            {
              "name": "courierimap-authmysqllib-sql-injection(11213)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/11213"
            },
            {
              "name": "6738",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/6738"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2003-0040",
    "datePublished": "2004-09-01T04:00:00",
    "dateReserved": "2003-01-27T00:00:00",
    "dateUpdated": "2024-08-08T01:43:34.900Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}