Vulnerabilites related to kolab - kolab_server
cve-2009-4824
Vulnerability from cvelistv5
Published
2010-04-27 15:00
Modified
2024-08-07 07:17
Severity ?
Summary
Unspecified vulnerability in Kolab Webclient before 1.2.0 in Kolab Server before 2.2.3 allows attackers to have an unspecified impact via vectors related to an "image upload form."
References
http://files.kolab.org/server/release/kolab-server-2.2.3/sources/release-notes.txtx_refsource_CONFIRM
http://secunia.com/advisories/37918third-party-advisory, x_refsource_SECUNIA
http://www.mandriva.com/security/advisories?name=MDVSA-2010:108vendor-advisory, x_refsource_MANDRIVA
http://osvdb.org/61301vdb-entry, x_refsource_OSVDB
http://www.vupen.com/english/advisories/2010/1245vdb-entry, x_refsource_VUPEN
http://www.securityfocus.com/bid/37465vdb-entry, x_refsource_BID
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T07:17:25.385Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://files.kolab.org/server/release/kolab-server-2.2.3/sources/release-notes.txt"
          },
          {
            "name": "37918",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/37918"
          },
          {
            "name": "MDVSA-2010:108",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:108"
          },
          {
            "name": "61301",
            "tags": [
              "vdb-entry",
              "x_refsource_OSVDB",
              "x_transferred"
            ],
            "url": "http://osvdb.org/61301"
          },
          {
            "name": "ADV-2010-1245",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2010/1245"
          },
          {
            "name": "37465",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/37465"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2009-12-24T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "Unspecified vulnerability in Kolab Webclient before 1.2.0 in Kolab Server before 2.2.3 allows attackers to have an unspecified impact via vectors related to an \"image upload form.\""
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2010-06-05T09:00:00",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://files.kolab.org/server/release/kolab-server-2.2.3/sources/release-notes.txt"
        },
        {
          "name": "37918",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/37918"
        },
        {
          "name": "MDVSA-2010:108",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:108"
        },
        {
          "name": "61301",
          "tags": [
            "vdb-entry",
            "x_refsource_OSVDB"
          ],
          "url": "http://osvdb.org/61301"
        },
        {
          "name": "ADV-2010-1245",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2010/1245"
        },
        {
          "name": "37465",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/37465"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2009-4824",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "Unspecified vulnerability in Kolab Webclient before 1.2.0 in Kolab Server before 2.2.3 allows attackers to have an unspecified impact via vectors related to an \"image upload form.\""
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "http://files.kolab.org/server/release/kolab-server-2.2.3/sources/release-notes.txt",
              "refsource": "CONFIRM",
              "url": "http://files.kolab.org/server/release/kolab-server-2.2.3/sources/release-notes.txt"
            },
            {
              "name": "37918",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/37918"
            },
            {
              "name": "MDVSA-2010:108",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:108"
            },
            {
              "name": "61301",
              "refsource": "OSVDB",
              "url": "http://osvdb.org/61301"
            },
            {
              "name": "ADV-2010-1245",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2010/1245"
            },
            {
              "name": "37465",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/37465"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2009-4824",
    "datePublished": "2010-04-27T15:00:00",
    "dateReserved": "2010-04-27T00:00:00",
    "dateUpdated": "2024-08-07T07:17:25.385Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

cve-2007-4510
Vulnerability from cvelistv5
Published
2007-08-23 19:00
Modified
2024-08-07 15:01
Severity ?
Summary
ClamAV before 0.91.2, as used in Kolab Server 2.0 through 2.2beta1 and other products, allows remote attackers to cause a denial of service (application crash) via (1) a crafted RTF file, which triggers a NULL dereference in the cli_scanrtf function in libclamav/rtf.c; or (2) a crafted HTML document with a data: URI, which triggers a NULL dereference in the cli_html_normalise function in libclamav/htmlnorm.c. NOTE: some of these details are obtained from third party information.
References
https://exchange.xforce.ibmcloud.com/vulnerabilities/36173vdb-entry, x_refsource_XF
http://security.gentoo.org/glsa/glsa-200709-14.xmlvendor-advisory, x_refsource_GENTOO
http://secunia.com/advisories/26552third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26822third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26916third-party-advisory, x_refsource_SECUNIA
http://www.securityfocus.com/bid/25398vdb-entry, x_refsource_BID
http://secunia.com/advisories/26683third-party-advisory, x_refsource_SECUNIA
https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00104.htmlvendor-advisory, x_refsource_FEDORA
http://www.debian.org/security/2007/dsa-1366vendor-advisory, x_refsource_DEBIAN
http://kolab.org/security/kolab-vendor-notice-17.txtx_refsource_CONFIRM
http://securityreason.com/securityalert/3054third-party-advisory, x_refsource_SREASON
http://www.vupen.com/english/advisories/2008/0924/referencesvdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/26530third-party-advisory, x_refsource_SECUNIA
https://wwws.clamav.net/bugzilla/show_bug.cgi?id=611x_refsource_CONFIRM
http://www.trustix.org/errata/2007/0026/vendor-advisory, x_refsource_TRUSTIX
http://secunia.com/advisories/29420third-party-advisory, x_refsource_SECUNIA
http://www.novell.com/linux/security/advisories/2007_18_sr.htmlvendor-advisory, x_refsource_SUSE
http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.htmlvendor-advisory, x_refsource_APPLE
https://wwws.clamav.net/bugzilla/show_bug.cgi?id=582x_refsource_CONFIRM
http://secunia.com/advisories/26751third-party-advisory, x_refsource_SECUNIA
http://secunia.com/advisories/26654third-party-advisory, x_refsource_SECUNIA
https://exchange.xforce.ibmcloud.com/vulnerabilities/36177vdb-entry, x_refsource_XF
http://docs.info.apple.com/article.html?artnum=307562x_refsource_CONFIRM
http://www.mandriva.com/security/advisories?name=MDKSA-2007:172vendor-advisory, x_refsource_MANDRIVA
http://sourceforge.net/project/shownotes.php?release_id=533658x_refsource_CONFIRM
http://www.vupen.com/english/advisories/2007/2952vdb-entry, x_refsource_VUPEN
http://secunia.com/advisories/26674third-party-advisory, x_refsource_SECUNIA
Impacted products
Vendor Product Version
n/a n/a Version: n/a
Show details on NVD website


{
  "containers": {
    "adp": [
      {
        "providerMetadata": {
          "dateUpdated": "2024-08-07T15:01:09.587Z",
          "orgId": "af854a3a-2127-422b-91ae-364da2661108",
          "shortName": "CVE"
        },
        "references": [
          {
            "name": "clamav-rtf-dos(36173)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36173"
          },
          {
            "name": "GLSA-200709-14",
            "tags": [
              "vendor-advisory",
              "x_refsource_GENTOO",
              "x_transferred"
            ],
            "url": "http://security.gentoo.org/glsa/glsa-200709-14.xml"
          },
          {
            "name": "26552",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26552"
          },
          {
            "name": "26822",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26822"
          },
          {
            "name": "26916",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26916"
          },
          {
            "name": "25398",
            "tags": [
              "vdb-entry",
              "x_refsource_BID",
              "x_transferred"
            ],
            "url": "http://www.securityfocus.com/bid/25398"
          },
          {
            "name": "26683",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26683"
          },
          {
            "name": "FEDORA-2007-2050",
            "tags": [
              "vendor-advisory",
              "x_refsource_FEDORA",
              "x_transferred"
            ],
            "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00104.html"
          },
          {
            "name": "DSA-1366",
            "tags": [
              "vendor-advisory",
              "x_refsource_DEBIAN",
              "x_transferred"
            ],
            "url": "http://www.debian.org/security/2007/dsa-1366"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://kolab.org/security/kolab-vendor-notice-17.txt"
          },
          {
            "name": "3054",
            "tags": [
              "third-party-advisory",
              "x_refsource_SREASON",
              "x_transferred"
            ],
            "url": "http://securityreason.com/securityalert/3054"
          },
          {
            "name": "ADV-2008-0924",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2008/0924/references"
          },
          {
            "name": "26530",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26530"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=611"
          },
          {
            "name": "2007-0026",
            "tags": [
              "vendor-advisory",
              "x_refsource_TRUSTIX",
              "x_transferred"
            ],
            "url": "http://www.trustix.org/errata/2007/0026/"
          },
          {
            "name": "29420",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/29420"
          },
          {
            "name": "SUSE-SR:2007:018",
            "tags": [
              "vendor-advisory",
              "x_refsource_SUSE",
              "x_transferred"
            ],
            "url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
          },
          {
            "name": "APPLE-SA-2008-03-18",
            "tags": [
              "vendor-advisory",
              "x_refsource_APPLE",
              "x_transferred"
            ],
            "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=582"
          },
          {
            "name": "26751",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26751"
          },
          {
            "name": "26654",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26654"
          },
          {
            "name": "clamav-clihtmlnormalise-dos(36177)",
            "tags": [
              "vdb-entry",
              "x_refsource_XF",
              "x_transferred"
            ],
            "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36177"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://docs.info.apple.com/article.html?artnum=307562"
          },
          {
            "name": "MDKSA-2007:172",
            "tags": [
              "vendor-advisory",
              "x_refsource_MANDRIVA",
              "x_transferred"
            ],
            "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:172"
          },
          {
            "tags": [
              "x_refsource_CONFIRM",
              "x_transferred"
            ],
            "url": "http://sourceforge.net/project/shownotes.php?release_id=533658"
          },
          {
            "name": "ADV-2007-2952",
            "tags": [
              "vdb-entry",
              "x_refsource_VUPEN",
              "x_transferred"
            ],
            "url": "http://www.vupen.com/english/advisories/2007/2952"
          },
          {
            "name": "26674",
            "tags": [
              "third-party-advisory",
              "x_refsource_SECUNIA",
              "x_transferred"
            ],
            "url": "http://secunia.com/advisories/26674"
          }
        ],
        "title": "CVE Program Container"
      }
    ],
    "cna": {
      "affected": [
        {
          "product": "n/a",
          "vendor": "n/a",
          "versions": [
            {
              "status": "affected",
              "version": "n/a"
            }
          ]
        }
      ],
      "datePublic": "2007-08-21T00:00:00",
      "descriptions": [
        {
          "lang": "en",
          "value": "ClamAV before 0.91.2, as used in Kolab Server 2.0 through 2.2beta1 and other products, allows remote attackers to cause a denial of service (application crash) via (1) a crafted RTF file, which triggers a NULL dereference in the cli_scanrtf function in libclamav/rtf.c; or (2) a crafted HTML document with a data: URI, which triggers a NULL dereference in the cli_html_normalise function in libclamav/htmlnorm.c.  NOTE: some of these details are obtained from third party information."
        }
      ],
      "problemTypes": [
        {
          "descriptions": [
            {
              "description": "n/a",
              "lang": "en",
              "type": "text"
            }
          ]
        }
      ],
      "providerMetadata": {
        "dateUpdated": "2017-07-28T12:57:01",
        "orgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
        "shortName": "mitre"
      },
      "references": [
        {
          "name": "clamav-rtf-dos(36173)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36173"
        },
        {
          "name": "GLSA-200709-14",
          "tags": [
            "vendor-advisory",
            "x_refsource_GENTOO"
          ],
          "url": "http://security.gentoo.org/glsa/glsa-200709-14.xml"
        },
        {
          "name": "26552",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26552"
        },
        {
          "name": "26822",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26822"
        },
        {
          "name": "26916",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26916"
        },
        {
          "name": "25398",
          "tags": [
            "vdb-entry",
            "x_refsource_BID"
          ],
          "url": "http://www.securityfocus.com/bid/25398"
        },
        {
          "name": "26683",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26683"
        },
        {
          "name": "FEDORA-2007-2050",
          "tags": [
            "vendor-advisory",
            "x_refsource_FEDORA"
          ],
          "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00104.html"
        },
        {
          "name": "DSA-1366",
          "tags": [
            "vendor-advisory",
            "x_refsource_DEBIAN"
          ],
          "url": "http://www.debian.org/security/2007/dsa-1366"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://kolab.org/security/kolab-vendor-notice-17.txt"
        },
        {
          "name": "3054",
          "tags": [
            "third-party-advisory",
            "x_refsource_SREASON"
          ],
          "url": "http://securityreason.com/securityalert/3054"
        },
        {
          "name": "ADV-2008-0924",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2008/0924/references"
        },
        {
          "name": "26530",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26530"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=611"
        },
        {
          "name": "2007-0026",
          "tags": [
            "vendor-advisory",
            "x_refsource_TRUSTIX"
          ],
          "url": "http://www.trustix.org/errata/2007/0026/"
        },
        {
          "name": "29420",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/29420"
        },
        {
          "name": "SUSE-SR:2007:018",
          "tags": [
            "vendor-advisory",
            "x_refsource_SUSE"
          ],
          "url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
        },
        {
          "name": "APPLE-SA-2008-03-18",
          "tags": [
            "vendor-advisory",
            "x_refsource_APPLE"
          ],
          "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=582"
        },
        {
          "name": "26751",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26751"
        },
        {
          "name": "26654",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26654"
        },
        {
          "name": "clamav-clihtmlnormalise-dos(36177)",
          "tags": [
            "vdb-entry",
            "x_refsource_XF"
          ],
          "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36177"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://docs.info.apple.com/article.html?artnum=307562"
        },
        {
          "name": "MDKSA-2007:172",
          "tags": [
            "vendor-advisory",
            "x_refsource_MANDRIVA"
          ],
          "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:172"
        },
        {
          "tags": [
            "x_refsource_CONFIRM"
          ],
          "url": "http://sourceforge.net/project/shownotes.php?release_id=533658"
        },
        {
          "name": "ADV-2007-2952",
          "tags": [
            "vdb-entry",
            "x_refsource_VUPEN"
          ],
          "url": "http://www.vupen.com/english/advisories/2007/2952"
        },
        {
          "name": "26674",
          "tags": [
            "third-party-advisory",
            "x_refsource_SECUNIA"
          ],
          "url": "http://secunia.com/advisories/26674"
        }
      ],
      "x_legacyV4Record": {
        "CVE_data_meta": {
          "ASSIGNER": "cve@mitre.org",
          "ID": "CVE-2007-4510",
          "STATE": "PUBLIC"
        },
        "affects": {
          "vendor": {
            "vendor_data": [
              {
                "product": {
                  "product_data": [
                    {
                      "product_name": "n/a",
                      "version": {
                        "version_data": [
                          {
                            "version_value": "n/a"
                          }
                        ]
                      }
                    }
                  ]
                },
                "vendor_name": "n/a"
              }
            ]
          }
        },
        "data_format": "MITRE",
        "data_type": "CVE",
        "data_version": "4.0",
        "description": {
          "description_data": [
            {
              "lang": "eng",
              "value": "ClamAV before 0.91.2, as used in Kolab Server 2.0 through 2.2beta1 and other products, allows remote attackers to cause a denial of service (application crash) via (1) a crafted RTF file, which triggers a NULL dereference in the cli_scanrtf function in libclamav/rtf.c; or (2) a crafted HTML document with a data: URI, which triggers a NULL dereference in the cli_html_normalise function in libclamav/htmlnorm.c.  NOTE: some of these details are obtained from third party information."
            }
          ]
        },
        "problemtype": {
          "problemtype_data": [
            {
              "description": [
                {
                  "lang": "eng",
                  "value": "n/a"
                }
              ]
            }
          ]
        },
        "references": {
          "reference_data": [
            {
              "name": "clamav-rtf-dos(36173)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36173"
            },
            {
              "name": "GLSA-200709-14",
              "refsource": "GENTOO",
              "url": "http://security.gentoo.org/glsa/glsa-200709-14.xml"
            },
            {
              "name": "26552",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26552"
            },
            {
              "name": "26822",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26822"
            },
            {
              "name": "26916",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26916"
            },
            {
              "name": "25398",
              "refsource": "BID",
              "url": "http://www.securityfocus.com/bid/25398"
            },
            {
              "name": "26683",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26683"
            },
            {
              "name": "FEDORA-2007-2050",
              "refsource": "FEDORA",
              "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00104.html"
            },
            {
              "name": "DSA-1366",
              "refsource": "DEBIAN",
              "url": "http://www.debian.org/security/2007/dsa-1366"
            },
            {
              "name": "http://kolab.org/security/kolab-vendor-notice-17.txt",
              "refsource": "CONFIRM",
              "url": "http://kolab.org/security/kolab-vendor-notice-17.txt"
            },
            {
              "name": "3054",
              "refsource": "SREASON",
              "url": "http://securityreason.com/securityalert/3054"
            },
            {
              "name": "ADV-2008-0924",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2008/0924/references"
            },
            {
              "name": "26530",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26530"
            },
            {
              "name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=611",
              "refsource": "CONFIRM",
              "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=611"
            },
            {
              "name": "2007-0026",
              "refsource": "TRUSTIX",
              "url": "http://www.trustix.org/errata/2007/0026/"
            },
            {
              "name": "29420",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/29420"
            },
            {
              "name": "SUSE-SR:2007:018",
              "refsource": "SUSE",
              "url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
            },
            {
              "name": "APPLE-SA-2008-03-18",
              "refsource": "APPLE",
              "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
            },
            {
              "name": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=582",
              "refsource": "CONFIRM",
              "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=582"
            },
            {
              "name": "26751",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26751"
            },
            {
              "name": "26654",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26654"
            },
            {
              "name": "clamav-clihtmlnormalise-dos(36177)",
              "refsource": "XF",
              "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36177"
            },
            {
              "name": "http://docs.info.apple.com/article.html?artnum=307562",
              "refsource": "CONFIRM",
              "url": "http://docs.info.apple.com/article.html?artnum=307562"
            },
            {
              "name": "MDKSA-2007:172",
              "refsource": "MANDRIVA",
              "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:172"
            },
            {
              "name": "http://sourceforge.net/project/shownotes.php?release_id=533658",
              "refsource": "CONFIRM",
              "url": "http://sourceforge.net/project/shownotes.php?release_id=533658"
            },
            {
              "name": "ADV-2007-2952",
              "refsource": "VUPEN",
              "url": "http://www.vupen.com/english/advisories/2007/2952"
            },
            {
              "name": "26674",
              "refsource": "SECUNIA",
              "url": "http://secunia.com/advisories/26674"
            }
          ]
        }
      }
    }
  },
  "cveMetadata": {
    "assignerOrgId": "8254265b-2729-46b6-b9e3-3dfca2d5bfca",
    "assignerShortName": "mitre",
    "cveId": "CVE-2007-4510",
    "datePublished": "2007-08-23T19:00:00",
    "dateReserved": "2007-08-23T00:00:00",
    "dateUpdated": "2024-08-07T15:01:09.587Z",
    "state": "PUBLISHED"
  },
  "dataType": "CVE_RECORD",
  "dataVersion": "5.1"
}

Vulnerability from fkie_nvd
Published
2010-04-27 15:30
Modified
2024-11-21 01:10
Severity ?
Summary
Unspecified vulnerability in Kolab Webclient before 1.2.0 in Kolab Server before 2.2.3 allows attackers to have an unspecified impact via vectors related to an "image upload form."



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "05B3AFFF-A4E9-451C-B2C4-2CBB72DC9EA7",
              "versionEndIncluding": "2.2.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.1.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "C1DB7A07-AB42-4BAC-9B44-EBA7E7A77C7B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.1.0:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "F3385D4A-53F2-4523-B82E-58245DBC04BB",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.1.0:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "D0FBB15C-80CE-41FB-8F9C-179C008B1B3C",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.1.0:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "D7E74881-422D-4341-9C03-48FC87CD07C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.1.0:beta4:*:*:*:*:*:*",
              "matchCriteriaId": "AA9E1F54-EAB9-41E0-99FE-6A41C0653C1F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.1.0:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "434A19E3-6C6A-40A4-96BA-625DE29EB03B",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.1.0:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "393D496F-46FF-498F-B879-B753D21908DC",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.2:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "955EF3D9-90E8-409A-99FC-3ECCF1049C30",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.2:beta2:*:*:*:*:*:*",
              "matchCriteriaId": "F697D5ED-4ED6-477E-9DE9-B9CCCFD1751A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.2:beta3:*:*:*:*:*:*",
              "matchCriteriaId": "A202A8CC-CEF4-4F5C-A513-2B5BFD62DCA1",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.2:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "5AB4DDA3-6A6E-426F-B1FD-72FD02D457DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.2:rc2:*:*:*:*:*:*",
              "matchCriteriaId": "92DB6988-16CB-49D6-AA6D-4D969913D1F6",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.2:rc3:*:*:*:*:*:*",
              "matchCriteriaId": "F4B45928-4350-4834-A71B-26BDAADF80DD",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "3510F066-E4BE-4D19-A672-2D3116232269",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "F8C3595B-5E8A-4D96-A902-01D21DCFAD9E",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.2.1:beta1:*:*:*:*:*:*",
              "matchCriteriaId": "38B3E4EC-A1A6-4B53-A865-99679F5A842F",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.2.1:rc1:*:*:*:*:*:*",
              "matchCriteriaId": "B47B3E36-B4C9-4BE6-8AE2-81C7080BE284",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "Unspecified vulnerability in Kolab Webclient before 1.2.0 in Kolab Server before 2.2.3 allows attackers to have an unspecified impact via vectors related to an \"image upload form.\""
    },
    {
      "lang": "es",
      "value": "Vulnerabilidad no especificada en Kolab Webclient anterior v1.2.0 en Kolab Server anterior v2.2.3 permite a atacantes remotos tener un impacto no especificado a trav\u00e9s de vectores relacionados con un \"formulario de carga de imagen\"\r\n"
    }
  ],
  "id": "CVE-2009-4824",
  "lastModified": "2024-11-21T01:10:33.190",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": true,
        "baseSeverity": "HIGH",
        "cvssData": {
          "accessComplexity": "LOW",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 7.5,
          "confidentialityImpact": "PARTIAL",
          "integrityImpact": "PARTIAL",
          "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 10.0,
        "impactScore": 6.4,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2010-04-27T15:30:00.983",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://files.kolab.org/server/release/kolab-server-2.2.3/sources/release-notes.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://osvdb.org/61301"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37918"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:108"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.securityfocus.com/bid/37465"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2010/1245"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://files.kolab.org/server/release/kolab-server-2.2.3/sources/release-notes.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://osvdb.org/61301"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/37918"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2010:108"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.securityfocus.com/bid/37465"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2010/1245"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-noinfo"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}

Vulnerability from fkie_nvd
Published
2007-08-23 19:17
Modified
2024-11-21 00:35
Severity ?
Summary
ClamAV before 0.91.2, as used in Kolab Server 2.0 through 2.2beta1 and other products, allows remote attackers to cause a denial of service (application crash) via (1) a crafted RTF file, which triggers a NULL dereference in the cli_scanrtf function in libclamav/rtf.c; or (2) a crafted HTML document with a data: URI, which triggers a NULL dereference in the cli_html_normalise function in libclamav/htmlnorm.c. NOTE: some of these details are obtained from third party information.
References
cve@mitre.orghttp://docs.info.apple.com/article.html?artnum=307562
cve@mitre.orghttp://kolab.org/security/kolab-vendor-notice-17.txt
cve@mitre.orghttp://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
cve@mitre.orghttp://secunia.com/advisories/26530Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26552Patch, Vendor Advisory
cve@mitre.orghttp://secunia.com/advisories/26654
cve@mitre.orghttp://secunia.com/advisories/26674
cve@mitre.orghttp://secunia.com/advisories/26683
cve@mitre.orghttp://secunia.com/advisories/26751
cve@mitre.orghttp://secunia.com/advisories/26822
cve@mitre.orghttp://secunia.com/advisories/26916
cve@mitre.orghttp://secunia.com/advisories/29420
cve@mitre.orghttp://security.gentoo.org/glsa/glsa-200709-14.xml
cve@mitre.orghttp://securityreason.com/securityalert/3054
cve@mitre.orghttp://sourceforge.net/project/shownotes.php?release_id=533658
cve@mitre.orghttp://www.debian.org/security/2007/dsa-1366
cve@mitre.orghttp://www.mandriva.com/security/advisories?name=MDKSA-2007:172
cve@mitre.orghttp://www.novell.com/linux/security/advisories/2007_18_sr.html
cve@mitre.orghttp://www.securityfocus.com/bid/25398Patch
cve@mitre.orghttp://www.trustix.org/errata/2007/0026/
cve@mitre.orghttp://www.vupen.com/english/advisories/2007/2952
cve@mitre.orghttp://www.vupen.com/english/advisories/2008/0924/references
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/36173
cve@mitre.orghttps://exchange.xforce.ibmcloud.com/vulnerabilities/36177
cve@mitre.orghttps://www.redhat.com/archives/fedora-package-announce/2007-September/msg00104.html
cve@mitre.orghttps://wwws.clamav.net/bugzilla/show_bug.cgi?id=582
cve@mitre.orghttps://wwws.clamav.net/bugzilla/show_bug.cgi?id=611
af854a3a-2127-422b-91ae-364da2661108http://docs.info.apple.com/article.html?artnum=307562
af854a3a-2127-422b-91ae-364da2661108http://kolab.org/security/kolab-vendor-notice-17.txt
af854a3a-2127-422b-91ae-364da2661108http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26530Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26552Patch, Vendor Advisory
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26654
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26674
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26683
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26751
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26822
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/26916
af854a3a-2127-422b-91ae-364da2661108http://secunia.com/advisories/29420
af854a3a-2127-422b-91ae-364da2661108http://security.gentoo.org/glsa/glsa-200709-14.xml
af854a3a-2127-422b-91ae-364da2661108http://securityreason.com/securityalert/3054
af854a3a-2127-422b-91ae-364da2661108http://sourceforge.net/project/shownotes.php?release_id=533658
af854a3a-2127-422b-91ae-364da2661108http://www.debian.org/security/2007/dsa-1366
af854a3a-2127-422b-91ae-364da2661108http://www.mandriva.com/security/advisories?name=MDKSA-2007:172
af854a3a-2127-422b-91ae-364da2661108http://www.novell.com/linux/security/advisories/2007_18_sr.html
af854a3a-2127-422b-91ae-364da2661108http://www.securityfocus.com/bid/25398Patch
af854a3a-2127-422b-91ae-364da2661108http://www.trustix.org/errata/2007/0026/
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2007/2952
af854a3a-2127-422b-91ae-364da2661108http://www.vupen.com/english/advisories/2008/0924/references
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/36173
af854a3a-2127-422b-91ae-364da2661108https://exchange.xforce.ibmcloud.com/vulnerabilities/36177
af854a3a-2127-422b-91ae-364da2661108https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00104.html
af854a3a-2127-422b-91ae-364da2661108https://wwws.clamav.net/bugzilla/show_bug.cgi?id=582
af854a3a-2127-422b-91ae-364da2661108https://wwws.clamav.net/bugzilla/show_bug.cgi?id=611
Impacted products



{
  "configurations": [
    {
      "nodes": [
        {
          "cpeMatch": [
            {
              "criteria": "cpe:2.3:a:clam_anti-virus:clamav:*:*:*:*:*:*:*:*",
              "matchCriteriaId": "0A6B4E75-086D-4141-9C09-0C13F5AC2456",
              "versionEndIncluding": "0.91.2",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.0:*:*:*:*:*:*:*",
              "matchCriteriaId": "B44412B2-C4BE-48E3-9E6F-E76431287A55",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.0.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "56D0BD75-65EE-41CA-A646-F476543D5D88",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.0.2:*:*:*:*:*:*:*",
              "matchCriteriaId": "DB32C390-2F52-420E-AF61-345B086860D9",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.0.3:*:*:*:*:*:*:*",
              "matchCriteriaId": "C65A4464-1321-4735-9A0E-E4AEBB47AE2A",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.0.4:*:*:*:*:*:*:*",
              "matchCriteriaId": "6B9E1099-5E39-42BE-B3CF-64CEC56466C7",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.1:*:*:*:*:*:*:*",
              "matchCriteriaId": "DA9889A6-0A8C-4313-A976-F641E9190436",
              "vulnerable": true
            },
            {
              "criteria": "cpe:2.3:a:kolab:kolab_server:2.2beta1:*:*:*:*:*:*:*",
              "matchCriteriaId": "6C011D46-31F9-47BC-8BF2-682823B0F2DE",
              "vulnerable": true
            }
          ],
          "negate": false,
          "operator": "OR"
        }
      ]
    }
  ],
  "cveTags": [],
  "descriptions": [
    {
      "lang": "en",
      "value": "ClamAV before 0.91.2, as used in Kolab Server 2.0 through 2.2beta1 and other products, allows remote attackers to cause a denial of service (application crash) via (1) a crafted RTF file, which triggers a NULL dereference in the cli_scanrtf function in libclamav/rtf.c; or (2) a crafted HTML document with a data: URI, which triggers a NULL dereference in the cli_html_normalise function in libclamav/htmlnorm.c.  NOTE: some of these details are obtained from third party information."
    },
    {
      "lang": "es",
      "value": "ClamAV anterior a 0.91.2, usado en Kolab Server 2.0 hasta 2.2.beta1 y otros productos, permite a atacantes remotos provocar una denegaci\u00f3n de servicio (ca\u00edda de aplicaci\u00f3n) mediante (1) un archivo RTF manipulado, que dispara una referencia a NULL en la funci\u00f3n cli-scanrtf de libclamav/rtf.c; o (2) un documento HTML manipulado con un URI data:, el cual dispara una referencia a NULL en la funci\u00f3n cli_html_normalise de libclamav/htmlnorm.c. NOTA: algunos de estos detalles se han obtenido de informaci\u00f3n de terceros."
    }
  ],
  "id": "CVE-2007-4510",
  "lastModified": "2024-11-21T00:35:46.190",
  "metrics": {
    "cvssMetricV2": [
      {
        "acInsufInfo": false,
        "baseSeverity": "MEDIUM",
        "cvssData": {
          "accessComplexity": "MEDIUM",
          "accessVector": "NETWORK",
          "authentication": "NONE",
          "availabilityImpact": "PARTIAL",
          "baseScore": 4.3,
          "confidentialityImpact": "NONE",
          "integrityImpact": "NONE",
          "vectorString": "AV:N/AC:M/Au:N/C:N/I:N/A:P",
          "version": "2.0"
        },
        "exploitabilityScore": 8.6,
        "impactScore": 2.9,
        "obtainAllPrivilege": false,
        "obtainOtherPrivilege": false,
        "obtainUserPrivilege": false,
        "source": "nvd@nist.gov",
        "type": "Primary",
        "userInteractionRequired": false
      }
    ]
  },
  "published": "2007-08-23T19:17:00.000",
  "references": [
    {
      "source": "cve@mitre.org",
      "url": "http://docs.info.apple.com/article.html?artnum=307562"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://kolab.org/security/kolab-vendor-notice-17.txt"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26530"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26552"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26654"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26674"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26683"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26751"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26822"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/26916"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://secunia.com/advisories/29420"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://security.gentoo.org/glsa/glsa-200709-14.xml"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://securityreason.com/securityalert/3054"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=533658"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.debian.org/security/2007/dsa-1366"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:172"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
    },
    {
      "source": "cve@mitre.org",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25398"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.trustix.org/errata/2007/0026/"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2007/2952"
    },
    {
      "source": "cve@mitre.org",
      "url": "http://www.vupen.com/english/advisories/2008/0924/references"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36173"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36177"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00104.html"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=582"
    },
    {
      "source": "cve@mitre.org",
      "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=611"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://docs.info.apple.com/article.html?artnum=307562"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://kolab.org/security/kolab-vendor-notice-17.txt"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://lists.apple.com/archives/security-announce/2008/Mar/msg00001.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26530"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch",
        "Vendor Advisory"
      ],
      "url": "http://secunia.com/advisories/26552"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26654"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26674"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26683"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26751"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26822"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/26916"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://secunia.com/advisories/29420"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://security.gentoo.org/glsa/glsa-200709-14.xml"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://securityreason.com/securityalert/3054"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://sourceforge.net/project/shownotes.php?release_id=533658"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.debian.org/security/2007/dsa-1366"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.mandriva.com/security/advisories?name=MDKSA-2007:172"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.novell.com/linux/security/advisories/2007_18_sr.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "tags": [
        "Patch"
      ],
      "url": "http://www.securityfocus.com/bid/25398"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.trustix.org/errata/2007/0026/"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2007/2952"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "http://www.vupen.com/english/advisories/2008/0924/references"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36173"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/36177"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://www.redhat.com/archives/fedora-package-announce/2007-September/msg00104.html"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=582"
    },
    {
      "source": "af854a3a-2127-422b-91ae-364da2661108",
      "url": "https://wwws.clamav.net/bugzilla/show_bug.cgi?id=611"
    }
  ],
  "sourceIdentifier": "cve@mitre.org",
  "vulnStatus": "Modified",
  "weaknesses": [
    {
      "description": [
        {
          "lang": "en",
          "value": "NVD-CWE-Other"
        }
      ],
      "source": "nvd@nist.gov",
      "type": "Primary"
    }
  ]
}