Action not permitted
Modal body text goes here.
Modal Title
Modal Body
CVE-2014-7844 (GCVE-0-2014-7844)
Vulnerability from cvelistv5
Published
2020-01-14 16:13
Modified
2024-08-06 13:03
Severity ?
VLAI Severity ?
EPSS score ?
CWE
- Metacharacters
Summary
BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.
References
{ "containers": { "adp": [ { "providerMetadata": { "dateUpdated": "2024-08-06T13:03:27.517Z", "orgId": "af854a3a-2127-422b-91ae-364da2661108", "shortName": "CVE" }, "references": [ { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://seclists.org/oss-sec/2014/q4/1066" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1999.html" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3104" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://www.debian.org/security/2014/dsa-3105" }, { "tags": [ "x_refsource_MISC", "x_transferred" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1999.html" } ], "title": "CVE Program Container" } ], "cna": { "affected": [ { "product": "mailx", "vendor": "BSD", "versions": [ { "status": "affected", "version": "8.1.2 and earlier" } ] } ], "datePublic": "2004-10-29T00:00:00", "descriptions": [ { "lang": "en", "value": "BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address." } ], "problemTypes": [ { "descriptions": [ { "description": "Metacharacters", "lang": "en", "type": "text" } ] } ], "providerMetadata": { "dateUpdated": "2020-01-14T16:13:01", "orgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "shortName": "redhat" }, "references": [ { "tags": [ "x_refsource_MISC" ], "url": "http://seclists.org/oss-sec/2014/q4/1066" }, { "tags": [ "x_refsource_MISC" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1999.html" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.debian.org/security/2014/dsa-3104" }, { "tags": [ "x_refsource_MISC" ], "url": "http://www.debian.org/security/2014/dsa-3105" }, { "tags": [ "x_refsource_MISC" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1999.html" } ] } }, "cveMetadata": { "assignerOrgId": "53f830b8-0a3f-465b-8143-3b8a9948e749", "assignerShortName": "redhat", "cveId": "CVE-2014-7844", "datePublished": "2020-01-14T16:13:01", "dateReserved": "2014-10-03T00:00:00", "dateUpdated": "2024-08-06T13:03:27.517Z", "state": "PUBLISHED" }, "dataType": "CVE_RECORD", "dataVersion": "5.1", "vulnerability-lookup:meta": { "nvd": "{\"cve\":{\"id\":\"CVE-2014-7844\",\"sourceIdentifier\":\"secalert@redhat.com\",\"published\":\"2020-01-14T17:15:11.940\",\"lastModified\":\"2024-11-21T02:18:07.667\",\"vulnStatus\":\"Modified\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.\"},{\"lang\":\"es\",\"value\":\"BSD mailx versi\u00f3n 8.1.2 y anteriores, permiten a atacantes remotos ejecutar comandos arbitrarios por medio de una direcci\u00f3n de correo electr\u00f3nico dise\u00f1ada.\"}],\"metrics\":{\"cvssMetricV31\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.1\",\"vectorString\":\"CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H\",\"baseScore\":7.8,\"baseSeverity\":\"HIGH\",\"attackVector\":\"LOCAL\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"LOW\",\"userInteraction\":\"NONE\",\"scope\":\"UNCHANGED\",\"confidentialityImpact\":\"HIGH\",\"integrityImpact\":\"HIGH\",\"availabilityImpact\":\"HIGH\"},\"exploitabilityScore\":1.8,\"impactScore\":5.9}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:L/AC:L/Au:N/C:C/I:C/A:C\",\"baseScore\":7.2,\"accessVector\":\"LOCAL\",\"accessComplexity\":\"LOW\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"COMPLETE\",\"integrityImpact\":\"COMPLETE\",\"availabilityImpact\":\"COMPLETE\"},\"baseSeverity\":\"HIGH\",\"exploitabilityScore\":3.9,\"impactScore\":10.0,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":false}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-74\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"33C068A4-3780-4EAB-A937-6082DF847564\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9BBCD86A-E6C7-4444-9D74-F861084090F0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"51EF4996-72F4-4FA4-814F-F5991E7A8318\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16E6D998-B41D-4B49-9E00-8336D2E40A4A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"98381E61-F082-4302-B51F-5648884F998B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D99A687E-EAE6-417E-A88E-D0082BC194CD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B353CE99-D57C-465B-AAB0-73EF581127D1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7431ABC1-9252-419E-8CC1-311B41360078\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"C18E3368-8980-45D2-AD3F-5BF385ABA693\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"44B067C7-735E-43C9-9188-7E1522A02491\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A8442C20-41F9-47FD-9A12-E724D3A31FD7\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"BF77CDCF-B9C9-427D-B2BF-36650FB2148C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21690BAC-2129-4A33-9B48-1F3BF30072A9\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"13E02156-E748-4820-B76F-7074793837E1\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"B76AA310-FEC7-497F-AF04-C3EC1E76C4CC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"17F256A9-D3B9-4C72-B013-4EFD878BFEA8\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"E5ED5807-55B7-47C5-97A6-03233F4FBC3A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"825ECE2D-E232-46E0-A047-074B34DB1E97\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"16F59A04-14CF-49E2-9973-645477EA09DA\"}]}]},{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:bsd_mailx_project:bsd_mailx:8.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"8D9B055A-CBCF-4478-AFE9-5A744759A6D9\"}]}]}],\"references\":[{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1999.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1999.html\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/oss-sec/2014/q4/1066\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-3104\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-3105\",\"source\":\"secalert@redhat.com\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://linux.oracle.com/errata/ELSA-2014-1999.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://rhn.redhat.com/errata/RHSA-2014-1999.html\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://seclists.org/oss-sec/2014/q4/1066\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Mailing List\",\"Patch\",\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-3104\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]},{\"url\":\"http://www.debian.org/security/2014/dsa-3105\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\"]}]}}" } }
ghsa-v8v3-2m82-gr7p
Vulnerability from github
Published
2022-05-17 19:57
Modified
2023-02-02 21:34
Severity ?
VLAI Severity ?
Details
BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.
{ "affected": [], "aliases": [ "CVE-2014-7844" ], "database_specific": { "cwe_ids": [ "CWE-74" ], "github_reviewed": false, "github_reviewed_at": null, "nvd_published_at": "2020-01-14T17:15:00Z", "severity": "HIGH" }, "details": "BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.", "id": "GHSA-v8v3-2m82-gr7p", "modified": "2023-02-02T21:34:03Z", "published": "2022-05-17T19:57:17Z", "references": [ { "type": "ADVISORY", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7844" }, { "type": "WEB", "url": "https://access.redhat.com/errata/RHSA-2014:1999" }, { "type": "WEB", "url": "https://access.redhat.com/security/cve/CVE-2014-7844" }, { "type": "WEB", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162783" }, { "type": "WEB", "url": "http://linux.oracle.com/errata/ELSA-2014-1999.html" }, { "type": "WEB", "url": "http://rhn.redhat.com/errata/RHSA-2014-1999.html" }, { "type": "WEB", "url": "http://seclists.org/oss-sec/2014/q4/1066" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-3104" }, { "type": "WEB", "url": "http://www.debian.org/security/2014/dsa-3105" } ], "schema_version": "1.4.0", "severity": [ { "score": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "type": "CVSS_V3" } ] }
suse-ru-2015:0876-1
Vulnerability from csaf_suse
Published
2013-12-10 16:46
Modified
2013-12-10 16:46
Summary
Recommended update for mailx
Notes
Title of the patch
Recommended update for mailx
Description of the patch
This update for mailx enables IPv6 support and includes the following
fixes:
* Crop off the brackets of an ipv6 address if found. (bnc#853246)
* Enable mailx to parse IPv6 addresses including a port ([ipv6]:port).
(bnc#853246)
* Do not pseudo detect Latin nor UTF-8 in binary attachments.
(bnc#827010)
Patchnames
sledsp3-mailx,slessp3-mailx
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Recommended update for mailx", "title": "Title of the patch" }, { "category": "description", "text": "\nThis update for mailx enables IPv6 support and includes the following \nfixes:\n\n * Crop off the brackets of an ipv6 address if found. (bnc#853246)\n * Enable mailx to parse IPv6 addresses including a port ([ipv6]:port).\n (bnc#853246)\n * Do not pseudo detect Latin nor UTF-8 in binary attachments.\n (bnc#827010)\n\n", "title": "Description of the patch" }, { "category": "details", "text": "sledsp3-mailx,slessp3-mailx", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/suse-ru-2015_0876-1.json" }, { "category": "self", "summary": "URL for SUSE-RU-2015:0876-1", "url": "https://www.suse.com/support/update/announcement//suse-ru-20150876-1/" }, { "category": "self", "summary": "E-Mail link for SUSE-RU-2015:0876-1", "url": "https://lists.suse.com/pipermail/sle-updates/2015-May/002978.html" }, { "category": "self", "summary": "SUSE Bug 827010", "url": "https://bugzilla.suse.com/827010" }, { "category": "self", "summary": "SUSE Bug 853246", "url": "https://bugzilla.suse.com/853246" }, { "category": "self", "summary": "SUSE Bug 909208", "url": "https://bugzilla.suse.com/909208" }, { "category": "self", "summary": "SUSE Bug 922543", "url": "https://bugzilla.suse.com/922543" }, { "category": "self", "summary": "SUSE CVE CVE-2004-2771 page", "url": "https://www.suse.com/security/cve/CVE-2004-2771/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7844 page", "url": "https://www.suse.com/security/cve/CVE-2014-7844/" } ], "title": "Recommended update for mailx", "tracking": { "current_release_date": "2013-12-10T16:46:46Z", "generator": { "date": "2013-12-10T16:46:46Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "SUSE-RU-2015:0876-1", "initial_release_date": "2013-12-10T16:46:46Z", "revision_history": [ { "date": "2013-12-10T16:46:46Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "mailx-12.5-1.5.1.i586", "product": { "name": "mailx-12.5-1.5.1.i586", "product_id": "mailx-12.5-1.5.1.i586" } } ], "category": "architecture", "name": "i586" }, { "branches": [ { "category": "product_version", "name": "mailx-12.5-1.5.1.ia64", "product": { "name": "mailx-12.5-1.5.1.ia64", "product_id": "mailx-12.5-1.5.1.ia64" } } ], "category": "architecture", "name": "ia64" }, { "branches": [ { "category": "product_version", "name": "mailx-12.5-1.5.1.ppc64", "product": { "name": "mailx-12.5-1.5.1.ppc64", "product_id": "mailx-12.5-1.5.1.ppc64" } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "mailx-12.5-1.5.1.s390x", "product": { "name": "mailx-12.5-1.5.1.s390x", "product_id": "mailx-12.5-1.5.1.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mailx-12.5-1.5.1.x86_64", "product": { "name": "mailx-12.5-1.5.1.x86_64", "product_id": "mailx-12.5-1.5.1.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "SUSE Linux Enterprise Desktop 11 SP3", "product": { "name": "SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sled:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3", "product": { "name": "SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:suse_sles:11:sp3" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product": { "name": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_identification_helper": { "cpe": "cpe:/o:suse:sles:11:sp3:teradata" } } }, { "category": "product_name", "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product": { "name": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_identification_helper": { "cpe": "cpe:/o:suse:sles_sap:11:sp3" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.i586 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.i586" }, "product_reference": "mailx-12.5-1.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.x86_64 as component of SUSE Linux Enterprise Desktop 11 SP3", "product_id": "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.x86_64" }, "product_reference": "mailx-12.5-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Desktop 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.i586" }, "product_reference": "mailx-12.5-1.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ia64" }, "product_reference": "mailx-12.5-1.5.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ppc64" }, "product_reference": "mailx-12.5-1.5.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.s390x" }, "product_reference": "mailx-12.5-1.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3", "product_id": "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.x86_64" }, "product_reference": "mailx-12.5-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.i586 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.i586" }, "product_reference": "mailx-12.5-1.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.ia64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ia64" }, "product_reference": "mailx-12.5-1.5.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.ppc64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ppc64" }, "product_reference": "mailx-12.5-1.5.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.s390x as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.s390x" }, "product_reference": "mailx-12.5-1.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.x86_64 as component of SUSE Linux Enterprise Server 11 SP3-TERADATA", "product_id": "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.x86_64" }, "product_reference": "mailx-12.5-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server 11 SP3-TERADATA" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.i586 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.i586" }, "product_reference": "mailx-12.5-1.5.1.i586", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.ia64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ia64" }, "product_reference": "mailx-12.5-1.5.1.ia64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.ppc64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ppc64" }, "product_reference": "mailx-12.5-1.5.1.ppc64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.s390x as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.s390x" }, "product_reference": "mailx-12.5-1.5.1.s390x", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-1.5.1.x86_64 as component of SUSE Linux Enterprise Server for SAP Applications 11 SP3", "product_id": "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.x86_64" }, "product_reference": "mailx-12.5-1.5.1.x86_64", "relates_to_product_reference": "SUSE Linux Enterprise Server for SAP Applications 11 SP3" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-2771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2004-2771" } ], "notes": [ { "category": "general", "text": "The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2004-2771", "url": "https://www.suse.com/security/cve/CVE-2004-2771" }, { "category": "external", "summary": "SUSE Bug 909208 for CVE-2004-2771", "url": "https://bugzilla.suse.com/909208" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2013-12-10T16:46:46Z", "details": "important" } ], "title": "CVE-2004-2771" }, { "cve": "CVE-2014-7844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7844" } ], "notes": [ { "category": "general", "text": "BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.", "title": "CVE description" } ], "product_status": { "recommended": [ "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7844", "url": "https://www.suse.com/security/cve/CVE-2014-7844" }, { "category": "external", "summary": "SUSE Bug 909208 for CVE-2014-7844", "url": "https://bugzilla.suse.com/909208" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Desktop 11 SP3:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3-TERADATA:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server 11 SP3:mailx-12.5-1.5.1.x86_64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.i586", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ia64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.ppc64", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.s390x", "SUSE Linux Enterprise Server for SAP Applications 11 SP3:mailx-12.5-1.5.1.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2013-12-10T16:46:46Z", "details": "important" } ], "title": "CVE-2014-7844" } ] }
opensuse-su-2024:10561-1
Vulnerability from csaf_opensuse
Published
2024-06-15 00:00
Modified
2024-06-15 00:00
Summary
mailx-12.5-24.4 on GA media
Notes
Title of the patch
mailx-12.5-24.4 on GA media
Description of the patch
These are all security issues fixed in the mailx-12.5-24.4 package on the GA media of openSUSE Tumbleweed.
Patchnames
openSUSE-Tumbleweed-2024-10561
Terms of use
CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).
{ "document": { "aggregate_severity": { "namespace": "https://www.suse.com/support/security/rating/", "text": "moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright 2024 SUSE LLC. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "mailx-12.5-24.4 on GA media", "title": "Title of the patch" }, { "category": "description", "text": "These are all security issues fixed in the mailx-12.5-24.4 package on the GA media of openSUSE Tumbleweed.", "title": "Description of the patch" }, { "category": "details", "text": "openSUSE-Tumbleweed-2024-10561", "title": "Patchnames" }, { "category": "legal_disclaimer", "text": "CSAF 2.0 data is provided by SUSE under the Creative Commons License 4.0 with Attribution (CC-BY-4.0).", "title": "Terms of use" } ], "publisher": { "category": "vendor", "contact_details": "https://www.suse.com/support/security/contact/", "name": "SUSE Product Security Team", "namespace": "https://www.suse.com/" }, "references": [ { "category": "external", "summary": "SUSE ratings", "url": "https://www.suse.com/support/security/rating/" }, { "category": "self", "summary": "URL of this CSAF notice", "url": "https://ftp.suse.com/pub/projects/security/csaf/opensuse-su-2024_10561-1.json" }, { "category": "self", "summary": "SUSE CVE CVE-2004-2771 page", "url": "https://www.suse.com/security/cve/CVE-2004-2771/" }, { "category": "self", "summary": "SUSE CVE CVE-2014-7844 page", "url": "https://www.suse.com/security/cve/CVE-2014-7844/" } ], "title": "mailx-12.5-24.4 on GA media", "tracking": { "current_release_date": "2024-06-15T00:00:00Z", "generator": { "date": "2024-06-15T00:00:00Z", "engine": { "name": "cve-database.git:bin/generate-csaf.pl", "version": "1" } }, "id": "openSUSE-SU-2024:10561-1", "initial_release_date": "2024-06-15T00:00:00Z", "revision_history": [ { "date": "2024-06-15T00:00:00Z", "number": "1", "summary": "Current version" } ], "status": "final", "version": "1" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_version", "name": "mailx-12.5-24.4.aarch64", "product": { "name": "mailx-12.5-24.4.aarch64", "product_id": "mailx-12.5-24.4.aarch64" } } ], "category": "architecture", "name": "aarch64" }, { "branches": [ { "category": "product_version", "name": "mailx-12.5-24.4.ppc64le", "product": { "name": "mailx-12.5-24.4.ppc64le", "product_id": "mailx-12.5-24.4.ppc64le" } } ], "category": "architecture", "name": "ppc64le" }, { "branches": [ { "category": "product_version", "name": "mailx-12.5-24.4.s390x", "product": { "name": "mailx-12.5-24.4.s390x", "product_id": "mailx-12.5-24.4.s390x" } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mailx-12.5-24.4.x86_64", "product": { "name": "mailx-12.5-24.4.x86_64", "product_id": "mailx-12.5-24.4.x86_64" } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_name", "name": "openSUSE Tumbleweed", "product": { "name": "openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed", "product_identification_helper": { "cpe": "cpe:/o:opensuse:tumbleweed" } } } ], "category": "product_family", "name": "SUSE Linux Enterprise" } ], "category": "vendor", "name": "SUSE" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-24.4.aarch64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mailx-12.5-24.4.aarch64" }, "product_reference": "mailx-12.5-24.4.aarch64", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-24.4.ppc64le as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mailx-12.5-24.4.ppc64le" }, "product_reference": "mailx-12.5-24.4.ppc64le", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-24.4.s390x as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mailx-12.5-24.4.s390x" }, "product_reference": "mailx-12.5-24.4.s390x", "relates_to_product_reference": "openSUSE Tumbleweed" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-12.5-24.4.x86_64 as component of openSUSE Tumbleweed", "product_id": "openSUSE Tumbleweed:mailx-12.5-24.4.x86_64" }, "product_reference": "mailx-12.5-24.4.x86_64", "relates_to_product_reference": "openSUSE Tumbleweed" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-2771", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2004-2771" } ], "notes": [ { "category": "general", "text": "The expand function in fio.c in Heirloom mailx 12.5 and earlier and BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via shell metacharacters in an email address.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mailx-12.5-24.4.aarch64", "openSUSE Tumbleweed:mailx-12.5-24.4.ppc64le", "openSUSE Tumbleweed:mailx-12.5-24.4.s390x", "openSUSE Tumbleweed:mailx-12.5-24.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2004-2771", "url": "https://www.suse.com/security/cve/CVE-2004-2771" }, { "category": "external", "summary": "SUSE Bug 909208 for CVE-2004-2771", "url": "https://bugzilla.suse.com/909208" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mailx-12.5-24.4.aarch64", "openSUSE Tumbleweed:mailx-12.5-24.4.ppc64le", "openSUSE Tumbleweed:mailx-12.5-24.4.s390x", "openSUSE Tumbleweed:mailx-12.5-24.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2004-2771" }, { "cve": "CVE-2014-7844", "ids": [ { "system_name": "SUSE CVE Page", "text": "https://www.suse.com/security/cve/CVE-2014-7844" } ], "notes": [ { "category": "general", "text": "BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.", "title": "CVE description" } ], "product_status": { "recommended": [ "openSUSE Tumbleweed:mailx-12.5-24.4.aarch64", "openSUSE Tumbleweed:mailx-12.5-24.4.ppc64le", "openSUSE Tumbleweed:mailx-12.5-24.4.s390x", "openSUSE Tumbleweed:mailx-12.5-24.4.x86_64" ] }, "references": [ { "category": "external", "summary": "CVE-2014-7844", "url": "https://www.suse.com/security/cve/CVE-2014-7844" }, { "category": "external", "summary": "SUSE Bug 909208 for CVE-2014-7844", "url": "https://bugzilla.suse.com/909208" } ], "remediations": [ { "category": "vendor_fix", "details": "To install this SUSE Security Update use the SUSE recommended installation methods like YaST online_update or \"zypper patch\".\n", "product_ids": [ "openSUSE Tumbleweed:mailx-12.5-24.4.aarch64", "openSUSE Tumbleweed:mailx-12.5-24.4.ppc64le", "openSUSE Tumbleweed:mailx-12.5-24.4.s390x", "openSUSE Tumbleweed:mailx-12.5-24.4.x86_64" ] } ], "scores": [ { "cvss_v3": { "baseScore": 7.8, "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "products": [ "openSUSE Tumbleweed:mailx-12.5-24.4.aarch64", "openSUSE Tumbleweed:mailx-12.5-24.4.ppc64le", "openSUSE Tumbleweed:mailx-12.5-24.4.s390x", "openSUSE Tumbleweed:mailx-12.5-24.4.x86_64" ] } ], "threats": [ { "category": "impact", "date": "2024-06-15T00:00:00Z", "details": "important" } ], "title": "CVE-2014-7844" } ] }
fkie_cve-2014-7844
Vulnerability from fkie_nvd
Published
2020-01-14 17:15
Modified
2024-11-21 02:18
Severity ?
Summary
BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.
References
▶ | URL | Tags | |
---|---|---|---|
secalert@redhat.com | http://linux.oracle.com/errata/ELSA-2014-1999.html | Third Party Advisory | |
secalert@redhat.com | http://rhn.redhat.com/errata/RHSA-2014-1999.html | Third Party Advisory | |
secalert@redhat.com | http://seclists.org/oss-sec/2014/q4/1066 | Mailing List, Patch, Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2014/dsa-3104 | Third Party Advisory | |
secalert@redhat.com | http://www.debian.org/security/2014/dsa-3105 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://linux.oracle.com/errata/ELSA-2014-1999.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://rhn.redhat.com/errata/RHSA-2014-1999.html | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://seclists.org/oss-sec/2014/q4/1066 | Mailing List, Patch, Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-3104 | Third Party Advisory | |
af854a3a-2127-422b-91ae-364da2661108 | http://www.debian.org/security/2014/dsa-3105 | Third Party Advisory |
Impacted products
Vendor | Product | Version | |
---|---|---|---|
redhat | enterprise_linux_desktop | 6.0 | |
redhat | enterprise_linux_desktop | 7.0 | |
redhat | enterprise_linux_server | 6.0 | |
redhat | enterprise_linux_server | 7.0 | |
redhat | enterprise_linux_server_aus | 6.6 | |
redhat | enterprise_linux_server_aus | 7.3 | |
redhat | enterprise_linux_server_aus | 7.4 | |
redhat | enterprise_linux_server_aus | 7.6 | |
redhat | enterprise_linux_server_aus | 7.7 | |
redhat | enterprise_linux_server_eus | 6.6 | |
redhat | enterprise_linux_server_eus | 7.2 | |
redhat | enterprise_linux_server_eus | 7.3 | |
redhat | enterprise_linux_server_eus | 7.4 | |
redhat | enterprise_linux_server_eus | 7.5 | |
redhat | enterprise_linux_server_eus | 7.6 | |
redhat | enterprise_linux_server_eus | 7.7 | |
redhat | enterprise_linux_server_tus | 6.6 | |
redhat | enterprise_linux_server_tus | 7.3 | |
redhat | enterprise_linux_server_tus | 7.6 | |
redhat | enterprise_linux_server_tus | 7.7 | |
redhat | enterprise_linux_workstation | 6.0 | |
redhat | enterprise_linux_workstation | 7.0 | |
debian | debian_linux | 7.0 | |
bsd_mailx_project | bsd_mailx | 8.1.2 |
{ "configurations": [ { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "EE249E1B-A1FD-4E08-AA71-A0E1F10FFE97", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "33C068A4-3780-4EAB-A937-6082DF847564", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "9BBCD86A-E6C7-4444-9D74-F861084090F0", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "51EF4996-72F4-4FA4-814F-F5991E7A8318", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "16E6D998-B41D-4B49-9E00-8336D2E40A4A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "98381E61-F082-4302-B51F-5648884F998B", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "D99A687E-EAE6-417E-A88E-D0082BC194CD", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B353CE99-D57C-465B-AAB0-73EF581127D1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "7431ABC1-9252-419E-8CC1-311B41360078", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "C18E3368-8980-45D2-AD3F-5BF385ABA693", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "matchCriteriaId": "44B067C7-735E-43C9-9188-7E1522A02491", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "A8442C20-41F9-47FD-9A12-E724D3A31FD7", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "matchCriteriaId": "9EC0D196-F7B8-4BDD-9050-779F7A7FBEE4", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "matchCriteriaId": "A4E9DD8A-A68B-4A69-8B01-BFF92A2020A8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "BF77CDCF-B9C9-427D-B2BF-36650FB2148C", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "21690BAC-2129-4A33-9B48-1F3BF30072A9", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "matchCriteriaId": "13E02156-E748-4820-B76F-7074793837E1", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "matchCriteriaId": "24C0F4E1-C52C-41E0-9F14-F83ADD5CC7ED", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "matchCriteriaId": "B76AA310-FEC7-497F-AF04-C3EC1E76C4CC", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "matchCriteriaId": "17F256A9-D3B9-4C72-B013-4EFD878BFEA8", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "matchCriteriaId": "E5ED5807-55B7-47C5-97A6-03233F4FBC3A", "vulnerable": true }, { "criteria": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "825ECE2D-E232-46E0-A047-074B34DB1E97", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "matchCriteriaId": "16F59A04-14CF-49E2-9973-645477EA09DA", "vulnerable": true } ], "negate": false, "operator": "OR" } ] }, { "nodes": [ { "cpeMatch": [ { "criteria": "cpe:2.3:a:bsd_mailx_project:bsd_mailx:8.1.2:*:*:*:*:*:*:*", "matchCriteriaId": "8D9B055A-CBCF-4478-AFE9-5A744759A6D9", "vulnerable": true } ], "negate": false, "operator": "OR" } ] } ], "cveTags": [], "descriptions": [ { "lang": "en", "value": "BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address." }, { "lang": "es", "value": "BSD mailx versi\u00f3n 8.1.2 y anteriores, permiten a atacantes remotos ejecutar comandos arbitrarios por medio de una direcci\u00f3n de correo electr\u00f3nico dise\u00f1ada." } ], "id": "CVE-2014-7844", "lastModified": "2024-11-21T02:18:07.667", "metrics": { "cvssMetricV2": [ { "acInsufInfo": false, "baseSeverity": "HIGH", "cvssData": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "source": "nvd@nist.gov", "type": "Primary", "userInteractionRequired": false } ], "cvssMetricV31": [ { "cvssData": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9, "source": "nvd@nist.gov", "type": "Primary" } ] }, "published": "2020-01-14T17:15:11.940", "references": [ { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1999.html" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1999.html" }, { "source": "secalert@redhat.com", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q4/1066" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3104" }, { "source": "secalert@redhat.com", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3105" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1999.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1999.html" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q4/1066" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3104" }, { "source": "af854a3a-2127-422b-91ae-364da2661108", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3105" } ], "sourceIdentifier": "secalert@redhat.com", "vulnStatus": "Modified", "weaknesses": [ { "description": [ { "lang": "en", "value": "CWE-74" } ], "source": "nvd@nist.gov", "type": "Primary" } ] }
rhsa-2014:1999
Vulnerability from csaf_redhat
Published
2014-12-16 19:44
Modified
2024-11-22 08:46
Summary
Red Hat Security Advisory: mailx security update
Notes
Topic
Updated mailx packages that fix two security issues are now available for
Red Hat Enterprise Linux 6 and 7.
Red Hat Product Security has rated this update as having Moderate security
impact. Common Vulnerability Scoring System (CVSS) base scores, which give
detailed severity ratings, are available for each vulnerability from the
CVE links in the References section.
Details
The mailx packages contain a mail user agent that is used to manage mail
using scripts.
A flaw was found in the way mailx handled the parsing of email addresses.
A syntactically valid email address could allow a local attacker to cause
mailx to execute arbitrary shell commands through shell meta-characters and
the direct command execution functionality. (CVE-2004-2771, CVE-2014-7844)
Note: Applications using mailx to send email to addresses obtained from
untrusted sources will still remain vulnerable to other attacks if they
accept email addresses which start with "-" (so that they can be confused
with mailx options). To counteract this issue, this update also introduces
the "--" option, which will treat the remaining command line arguments as
email addresses.
All mailx users are advised to upgrade to these updated packages, which
contain backported patches to correct these issues.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Moderate" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated mailx packages that fix two security issues are now available for\nRed Hat Enterprise Linux 6 and 7.\n\nRed Hat Product Security has rated this update as having Moderate security\nimpact. Common Vulnerability Scoring System (CVSS) base scores, which give\ndetailed severity ratings, are available for each vulnerability from the\nCVE links in the References section.", "title": "Topic" }, { "category": "general", "text": "The mailx packages contain a mail user agent that is used to manage mail\nusing scripts.\n\nA flaw was found in the way mailx handled the parsing of email addresses.\nA syntactically valid email address could allow a local attacker to cause\nmailx to execute arbitrary shell commands through shell meta-characters and\nthe direct command execution functionality. (CVE-2004-2771, CVE-2014-7844)\n\nNote: Applications using mailx to send email to addresses obtained from\nuntrusted sources will still remain vulnerable to other attacks if they\naccept email addresses which start with \"-\" (so that they can be confused\nwith mailx options). To counteract this issue, this update also introduces\nthe \"--\" option, which will treat the remaining command line arguments as\nemail addresses.\n\nAll mailx users are advised to upgrade to these updated packages, which\ncontain backported patches to correct these issues.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2014:1999", "url": "https://access.redhat.com/errata/RHSA-2014:1999" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#moderate", "url": "https://access.redhat.com/security/updates/classification/#moderate" }, { "category": "external", "summary": "1162783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162783" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2014/rhsa-2014_1999.json" } ], "title": "Red Hat Security Advisory: mailx security update", "tracking": { "current_release_date": "2024-11-22T08:46:02+00:00", "generator": { "date": "2024-11-22T08:46:02+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2014:1999", "initial_release_date": "2014-12-16T19:44:58+00:00", "revision_history": [ { "date": "2014-12-16T19:44:58+00:00", "number": "1", "summary": "Initial version" }, { "date": "2014-12-16T19:44:58+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-22T08:46:02+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux Client (v. 7)", "product": { "name": "Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product": { "name": "Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 7)", "product": { "name": "Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:7::workstation" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product": { "name": "Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::client" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product": { "name": "Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::computenode" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Server (v. 6)", "product": { "name": "Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::server" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product": { "name": "Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:6::workstation" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" }, { "branches": [ { "category": "product_version", "name": "mailx-0:12.5-12.el7_0.src", "product": { "name": "mailx-0:12.5-12.el7_0.src", "product_id": "mailx-0:12.5-12.el7_0.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx@12.5-12.el7_0?arch=src" } } }, { "category": "product_version", "name": "mailx-0:12.4-8.el6_6.src", "product": { "name": "mailx-0:12.4-8.el6_6.src", "product_id": "mailx-0:12.4-8.el6_6.src", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx@12.4-8.el6_6?arch=src" } } } ], "category": "architecture", "name": "src" }, { "branches": [ { "category": "product_version", "name": "mailx-0:12.5-12.el7_0.x86_64", "product": { "name": "mailx-0:12.5-12.el7_0.x86_64", "product_id": "mailx-0:12.5-12.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx@12.5-12.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "mailx-debuginfo-0:12.5-12.el7_0.x86_64", "product": { "name": "mailx-debuginfo-0:12.5-12.el7_0.x86_64", "product_id": "mailx-debuginfo-0:12.5-12.el7_0.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx-debuginfo@12.5-12.el7_0?arch=x86_64" } } }, { "category": "product_version", "name": "mailx-0:12.4-8.el6_6.x86_64", "product": { "name": "mailx-0:12.4-8.el6_6.x86_64", "product_id": "mailx-0:12.4-8.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx@12.4-8.el6_6?arch=x86_64" } } }, { "category": "product_version", "name": "mailx-debuginfo-0:12.4-8.el6_6.x86_64", "product": { "name": "mailx-debuginfo-0:12.4-8.el6_6.x86_64", "product_id": "mailx-debuginfo-0:12.4-8.el6_6.x86_64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx-debuginfo@12.4-8.el6_6?arch=x86_64" } } } ], "category": "architecture", "name": "x86_64" }, { "branches": [ { "category": "product_version", "name": "mailx-0:12.5-12.el7_0.s390x", "product": { "name": "mailx-0:12.5-12.el7_0.s390x", "product_id": "mailx-0:12.5-12.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx@12.5-12.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "mailx-debuginfo-0:12.5-12.el7_0.s390x", "product": { "name": "mailx-debuginfo-0:12.5-12.el7_0.s390x", "product_id": "mailx-debuginfo-0:12.5-12.el7_0.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx-debuginfo@12.5-12.el7_0?arch=s390x" } } }, { "category": "product_version", "name": "mailx-0:12.4-8.el6_6.s390x", "product": { "name": "mailx-0:12.4-8.el6_6.s390x", "product_id": "mailx-0:12.4-8.el6_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx@12.4-8.el6_6?arch=s390x" } } }, { "category": "product_version", "name": "mailx-debuginfo-0:12.4-8.el6_6.s390x", "product": { "name": "mailx-debuginfo-0:12.4-8.el6_6.s390x", "product_id": "mailx-debuginfo-0:12.4-8.el6_6.s390x", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx-debuginfo@12.4-8.el6_6?arch=s390x" } } } ], "category": "architecture", "name": "s390x" }, { "branches": [ { "category": "product_version", "name": "mailx-0:12.5-12.el7_0.ppc64", "product": { "name": "mailx-0:12.5-12.el7_0.ppc64", "product_id": "mailx-0:12.5-12.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx@12.5-12.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "mailx-debuginfo-0:12.5-12.el7_0.ppc64", "product": { "name": "mailx-debuginfo-0:12.5-12.el7_0.ppc64", "product_id": "mailx-debuginfo-0:12.5-12.el7_0.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx-debuginfo@12.5-12.el7_0?arch=ppc64" } } }, { "category": "product_version", "name": "mailx-0:12.4-8.el6_6.ppc64", "product": { "name": "mailx-0:12.4-8.el6_6.ppc64", "product_id": "mailx-0:12.4-8.el6_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx@12.4-8.el6_6?arch=ppc64" } } }, { "category": "product_version", "name": "mailx-debuginfo-0:12.4-8.el6_6.ppc64", "product": { "name": "mailx-debuginfo-0:12.4-8.el6_6.ppc64", "product_id": "mailx-debuginfo-0:12.4-8.el6_6.ppc64", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx-debuginfo@12.4-8.el6_6?arch=ppc64" } } } ], "category": "architecture", "name": "ppc64" }, { "branches": [ { "category": "product_version", "name": "mailx-0:12.4-8.el6_6.i686", "product": { "name": "mailx-0:12.4-8.el6_6.i686", "product_id": "mailx-0:12.4-8.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx@12.4-8.el6_6?arch=i686" } } }, { "category": "product_version", "name": "mailx-debuginfo-0:12.4-8.el6_6.i686", "product": { "name": "mailx-debuginfo-0:12.4-8.el6_6.i686", "product_id": "mailx-debuginfo-0:12.4-8.el6_6.i686", "product_identification_helper": { "purl": "pkg:rpm/redhat/mailx-debuginfo@12.4-8.el6_6?arch=i686" } } } ], "category": "architecture", "name": "i686" } ], "category": "vendor", "name": "Red Hat" } ], "relationships": [ { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:mailx-0:12.4-8.el6_6.i686" }, "product_reference": "mailx-0:12.4-8.el6_6.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:mailx-0:12.4-8.el6_6.ppc64" }, "product_reference": "mailx-0:12.4-8.el6_6.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:mailx-0:12.4-8.el6_6.s390x" }, "product_reference": "mailx-0:12.4-8.el6_6.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.src as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:mailx-0:12.4-8.el6_6.src" }, "product_reference": "mailx-0:12.4-8.el6_6.src", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:mailx-0:12.4-8.el6_6.x86_64" }, "product_reference": "mailx-0:12.4-8.el6_6.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.i686 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.i686", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.ppc64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.s390x as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.s390x", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Desktop (v. 6)", "product_id": "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.x86_64", "relates_to_product_reference": "6Client-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.i686" }, "product_reference": "mailx-0:12.4-8.el6_6.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.ppc64" }, "product_reference": "mailx-0:12.4-8.el6_6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.s390x" }, "product_reference": "mailx-0:12.4-8.el6_6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.src as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.src" }, "product_reference": "mailx-0:12.4-8.el6_6.src", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.x86_64" }, "product_reference": "mailx-0:12.4-8.el6_6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.i686 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.i686", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.ppc64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.s390x as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.s390x", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux HPC Node (v. 6)", "product_id": "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.x86_64", "relates_to_product_reference": "6ComputeNode-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:mailx-0:12.4-8.el6_6.i686" }, "product_reference": "mailx-0:12.4-8.el6_6.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:mailx-0:12.4-8.el6_6.ppc64" }, "product_reference": "mailx-0:12.4-8.el6_6.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:mailx-0:12.4-8.el6_6.s390x" }, "product_reference": "mailx-0:12.4-8.el6_6.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.src as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:mailx-0:12.4-8.el6_6.src" }, "product_reference": "mailx-0:12.4-8.el6_6.src", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:mailx-0:12.4-8.el6_6.x86_64" }, "product_reference": "mailx-0:12.4-8.el6_6.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.i686 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.i686", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.ppc64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.s390x as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.s390x", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Server (v. 6)", "product_id": "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.x86_64", "relates_to_product_reference": "6Server-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.i686" }, "product_reference": "mailx-0:12.4-8.el6_6.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.ppc64" }, "product_reference": "mailx-0:12.4-8.el6_6.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.s390x" }, "product_reference": "mailx-0:12.4-8.el6_6.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.src as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.src" }, "product_reference": "mailx-0:12.4-8.el6_6.src", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.4-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.x86_64" }, "product_reference": "mailx-0:12.4-8.el6_6.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.i686 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.i686", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.ppc64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.s390x as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.s390x", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.4-8.el6_6.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 6)", "product_id": "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64" }, "product_reference": "mailx-debuginfo-0:12.4-8.el6_6.x86_64", "relates_to_product_reference": "6Workstation-6.6.z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:mailx-0:12.5-12.el7_0.ppc64" }, "product_reference": "mailx-0:12.5-12.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:mailx-0:12.5-12.el7_0.s390x" }, "product_reference": "mailx-0:12.5-12.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.src as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:mailx-0:12.5-12.el7_0.src" }, "product_reference": "mailx-0:12.5-12.el7_0.src", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:mailx-0:12.5-12.el7_0.x86_64" }, "product_reference": "mailx-0:12.5-12.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.ppc64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.s390x as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.s390x", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Client (v. 7)", "product_id": "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.x86_64", "relates_to_product_reference": "7Client-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.ppc64" }, "product_reference": "mailx-0:12.5-12.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.s390x" }, "product_reference": "mailx-0:12.5-12.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.src as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.src" }, "product_reference": "mailx-0:12.5-12.el7_0.src", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.x86_64" }, "product_reference": "mailx-0:12.5-12.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.ppc64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.s390x as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.s390x", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux ComputeNode (v. 7)", "product_id": "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.x86_64", "relates_to_product_reference": "7ComputeNode-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mailx-0:12.5-12.el7_0.ppc64" }, "product_reference": "mailx-0:12.5-12.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mailx-0:12.5-12.el7_0.s390x" }, "product_reference": "mailx-0:12.5-12.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.src as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mailx-0:12.5-12.el7_0.src" }, "product_reference": "mailx-0:12.5-12.el7_0.src", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mailx-0:12.5-12.el7_0.x86_64" }, "product_reference": "mailx-0:12.5-12.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.ppc64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.s390x as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.s390x", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Server (v. 7)", "product_id": "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.x86_64", "relates_to_product_reference": "7Server-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.ppc64" }, "product_reference": "mailx-0:12.5-12.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.s390x" }, "product_reference": "mailx-0:12.5-12.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.src as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.src" }, "product_reference": "mailx-0:12.5-12.el7_0.src", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-0:12.5-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.x86_64" }, "product_reference": "mailx-0:12.5-12.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.ppc64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.ppc64", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.s390x as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.s390x", "relates_to_product_reference": "7Workstation-7.0.Z" }, { "category": "default_component_of", "full_product_name": { "name": "mailx-debuginfo-0:12.5-12.el7_0.x86_64 as a component of Red Hat Enterprise Linux Workstation (v. 7)", "product_id": "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64" }, "product_reference": "mailx-debuginfo-0:12.5-12.el7_0.x86_64", "relates_to_product_reference": "7Workstation-7.0.Z" } ] }, "vulnerabilities": [ { "cve": "CVE-2004-2771", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "discovery_date": "2014-10-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1162783" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way mailx handled the parsing of email addresses. A syntactically valid email address could allow a local attacker to cause mailx to execute arbitrary shell commands through shell meta-characters (CVE-2004-2771) and the direct command execution functionality (CVE-2014-7844).", "title": "Vulnerability description" }, { "category": "summary", "text": "mailx: command execution flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-0:12.4-8.el6_6.src", "6Client-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.src", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-0:12.4-8.el6_6.src", "6Server-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.src", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.src", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2004-2771" }, { "category": "external", "summary": "RHBZ#1162783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2004-2771", "url": "https://www.cve.org/CVERecord?id=CVE-2004-2771" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2004-2771", "url": "https://nvd.nist.gov/vuln/detail/CVE-2004-2771" } ], "release_date": "2014-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-12-16T19:44:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-0:12.4-8.el6_6.src", "6Client-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.src", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-0:12.4-8.el6_6.src", "6Server-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.src", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.src", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1999" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-0:12.4-8.el6_6.src", "6Client-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.src", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-0:12.4-8.el6_6.src", "6Server-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.src", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.src", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mailx: command execution flaw" }, { "cve": "CVE-2014-7844", "cwe": { "id": "CWE-78", "name": "Improper Neutralization of Special Elements used in an OS Command (\u0027OS Command Injection\u0027)" }, "discovery_date": "2014-10-29T00:00:00+00:00", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1162783" } ], "notes": [ { "category": "description", "text": "A flaw was found in the way mailx handled the parsing of email addresses. A syntactically valid email address could allow a local attacker to cause mailx to execute arbitrary shell commands through shell meta-characters (CVE-2004-2771) and the direct command execution functionality (CVE-2014-7844).", "title": "Vulnerability description" }, { "category": "summary", "text": "mailx: command execution flaw", "title": "Vulnerability summary" }, { "category": "other", "text": "Red Hat Enterprise Linux 5 is now in Production 3 Phase of the support and maintenance life cycle. This has been rated as having Moderate security impact and is not currently planned to be addressed in future updates. For additional information, refer to the Red Hat Enterprise Linux Life Cycle: https://access.redhat.com/support/policy/updates/errata/.", "title": "Statement" }, { "category": "general", "text": "The CVSS score(s) listed for this vulnerability do not reflect the associated product\u0027s status, and are included for informational purposes to better understand the severity of this vulnerability.", "title": "CVSS score applicability" } ], "product_status": { "fixed": [ "6Client-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-0:12.4-8.el6_6.src", "6Client-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.src", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-0:12.4-8.el6_6.src", "6Server-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.src", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.src", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2014-7844" }, { "category": "external", "summary": "RHBZ#1162783", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1162783" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2014-7844", "url": "https://www.cve.org/CVERecord?id=CVE-2014-7844" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2014-7844", "url": "https://nvd.nist.gov/vuln/detail/CVE-2014-7844" } ], "release_date": "2014-12-16T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2014-12-16T19:44:58+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nThis update is available via the Red Hat Network. Details on how to use the\nRed Hat Network to apply this update are available at\nhttps://access.redhat.com/articles/11258", "product_ids": [ "6Client-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-0:12.4-8.el6_6.src", "6Client-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.src", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-0:12.4-8.el6_6.src", "6Server-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.src", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.src", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2014:1999" } ], "scores": [ { "cvss_v2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "NONE", "baseScore": 3.6, "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "vectorString": "AV:L/AC:L/Au:N/C:P/I:P/A:N", "version": "2.0" }, "products": [ "6Client-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-0:12.4-8.el6_6.src", "6Client-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Client-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.src", "6ComputeNode-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6ComputeNode-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-0:12.4-8.el6_6.src", "6Server-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Server-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.src", "6Workstation-6.6.z:mailx-0:12.4-8.el6_6.x86_64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.i686", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.ppc64", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.s390x", "6Workstation-6.6.z:mailx-debuginfo-0:12.4-8.el6_6.x86_64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Client-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Client-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.src", "7ComputeNode-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7ComputeNode-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Server-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Server-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.src", "7Workstation-7.0.Z:mailx-0:12.5-12.el7_0.x86_64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.ppc64", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.s390x", "7Workstation-7.0.Z:mailx-debuginfo-0:12.5-12.el7_0.x86_64" ] } ], "threats": [ { "category": "impact", "details": "Moderate" } ], "title": "mailx: command execution flaw" } ] }
gsd-2014-7844
Vulnerability from gsd
Modified
2023-12-13 01:22
Details
BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.
Aliases
Aliases
{ "GSD": { "alias": "CVE-2014-7844", "description": "BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.", "id": "GSD-2014-7844", "references": [ "https://www.suse.com/security/cve/CVE-2014-7844.html", "https://www.debian.org/security/2014/dsa-3105", "https://www.debian.org/security/2014/dsa-3104", "https://access.redhat.com/errata/RHSA-2014:1999", "https://ubuntu.com/security/CVE-2014-7844", "https://advisories.mageia.org/CVE-2014-7844.html", "https://alas.aws.amazon.com/cve/html/CVE-2014-7844.html", "https://linux.oracle.com/cve/CVE-2014-7844.html" ] }, "gsd": { "metadata": { "exploitCode": "unknown", "remediation": "unknown", "reportConfidence": "confirmed", "type": "vulnerability" }, "osvSchema": { "aliases": [ "CVE-2014-7844" ], "details": "BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address.", "id": "GSD-2014-7844", "modified": "2023-12-13T01:22:47.388616Z", "schema_version": "1.4.0" } }, "namespaces": { "cve.org": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-7844", "STATE": "PUBLIC" }, "affects": { "vendor": { "vendor_data": [ { "product": { "product_data": [ { "product_name": "mailx", "version": { "version_data": [ { "version_affected": "=", "version_value": "8.1.2 and earlier" } ] } } ] }, "vendor_name": "BSD" } ] } }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "eng", "value": "BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "eng", "value": "Metacharacters" } ] } ] }, "references": { "reference_data": [ { "name": "http://linux.oracle.com/errata/ELSA-2014-1999.html", "refsource": "MISC", "url": "http://linux.oracle.com/errata/ELSA-2014-1999.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2014-1999.html", "refsource": "MISC", "url": "http://rhn.redhat.com/errata/RHSA-2014-1999.html" }, { "name": "http://seclists.org/oss-sec/2014/q4/1066", "refsource": "MISC", "url": "http://seclists.org/oss-sec/2014/q4/1066" }, { "name": "http://www.debian.org/security/2014/dsa-3104", "refsource": "MISC", "url": "http://www.debian.org/security/2014/dsa-3104" }, { "name": "http://www.debian.org/security/2014/dsa-3105", "refsource": "MISC", "url": "http://www.debian.org/security/2014/dsa-3105" } ] } }, "nvd.nist.gov": { "configurations": { "CVE_data_version": "4.0", "nodes": [ { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_desktop:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_workstation:6.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.3:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.4:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.5:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:6.6:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_eus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true }, { "cpe23Uri": "cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" }, { "children": [], "cpe_match": [ { "cpe23Uri": "cpe:2.3:a:bsd_mailx_project:bsd_mailx:8.1.2:*:*:*:*:*:*:*", "cpe_name": [], "vulnerable": true } ], "operator": "OR" } ] }, "cve": { "CVE_data_meta": { "ASSIGNER": "secalert@redhat.com", "ID": "CVE-2014-7844" }, "data_format": "MITRE", "data_type": "CVE", "data_version": "4.0", "description": { "description_data": [ { "lang": "en", "value": "BSD mailx 8.1.2 and earlier allows remote attackers to execute arbitrary commands via a crafted email address." } ] }, "problemtype": { "problemtype_data": [ { "description": [ { "lang": "en", "value": "CWE-74" } ] } ] }, "references": { "reference_data": [ { "name": "http://www.debian.org/security/2014/dsa-3104", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3104" }, { "name": "http://www.debian.org/security/2014/dsa-3105", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://www.debian.org/security/2014/dsa-3105" }, { "name": "http://seclists.org/oss-sec/2014/q4/1066", "refsource": "MISC", "tags": [ "Mailing List", "Patch", "Third Party Advisory" ], "url": "http://seclists.org/oss-sec/2014/q4/1066" }, { "name": "http://linux.oracle.com/errata/ELSA-2014-1999.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://linux.oracle.com/errata/ELSA-2014-1999.html" }, { "name": "http://rhn.redhat.com/errata/RHSA-2014-1999.html", "refsource": "MISC", "tags": [ "Third Party Advisory" ], "url": "http://rhn.redhat.com/errata/RHSA-2014-1999.html" } ] } }, "impact": { "baseMetricV2": { "acInsufInfo": false, "cvssV2": { "accessComplexity": "LOW", "accessVector": "LOCAL", "authentication": "NONE", "availabilityImpact": "COMPLETE", "baseScore": 7.2, "confidentialityImpact": "COMPLETE", "integrityImpact": "COMPLETE", "vectorString": "AV:L/AC:L/Au:N/C:C/I:C/A:C", "version": "2.0" }, "exploitabilityScore": 3.9, "impactScore": 10.0, "obtainAllPrivilege": false, "obtainOtherPrivilege": false, "obtainUserPrivilege": false, "severity": "HIGH", "userInteractionRequired": false }, "baseMetricV3": { "cvssV3": { "attackComplexity": "LOW", "attackVector": "LOCAL", "availabilityImpact": "HIGH", "baseScore": 7.8, "baseSeverity": "HIGH", "confidentialityImpact": "HIGH", "integrityImpact": "HIGH", "privilegesRequired": "LOW", "scope": "UNCHANGED", "userInteraction": "NONE", "vectorString": "CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H", "version": "3.1" }, "exploitabilityScore": 1.8, "impactScore": 5.9 } }, "lastModifiedDate": "2023-02-13T00:42Z", "publishedDate": "2020-01-14T17:15Z" } } }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…