var-200404-0032
Vulnerability from variot

Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm. The Protocol Analysis Module (PAM) used by Internet Security Systems (ISS) intrusion detection and prevention products does not properly handle ICQ server response messages. An unauthenticated, remote attacker could execute arbitrary code by sending a specially crafted UDP packet. This issue exists due to insufficient bounds checking performed on certain unspecified ICQ protocol fields supplied in ICQ response data. This attack would occur in the context of the vulnerable process. This module is used to parse network protocols and is included in a number of products provided by ISS, including various RealSecure and BlackICE releases. To call these affected functions, an attacker simply needs to construct an SRV_USER_ONLINE reply containing two nested reply packets. Attackers can forge data frames and send them to networks, devices, and hosts protected by ISS products

Show details on source website


{
  "@context": {
    "@vocab": "https://www.variotdbs.pl/ref/VARIoTentry#",
    "affected_products": {
      "@id": "https://www.variotdbs.pl/ref/affected_products"
    },
    "configurations": {
      "@id": "https://www.variotdbs.pl/ref/configurations"
    },
    "credits": {
      "@id": "https://www.variotdbs.pl/ref/credits"
    },
    "cvss": {
      "@id": "https://www.variotdbs.pl/ref/cvss/"
    },
    "description": {
      "@id": "https://www.variotdbs.pl/ref/description/"
    },
    "exploit_availability": {
      "@id": "https://www.variotdbs.pl/ref/exploit_availability/"
    },
    "external_ids": {
      "@id": "https://www.variotdbs.pl/ref/external_ids/"
    },
    "iot": {
      "@id": "https://www.variotdbs.pl/ref/iot/"
    },
    "iot_taxonomy": {
      "@id": "https://www.variotdbs.pl/ref/iot_taxonomy/"
    },
    "patch": {
      "@id": "https://www.variotdbs.pl/ref/patch/"
    },
    "problemtype_data": {
      "@id": "https://www.variotdbs.pl/ref/problemtype_data/"
    },
    "references": {
      "@id": "https://www.variotdbs.pl/ref/references/"
    },
    "sources": {
      "@id": "https://www.variotdbs.pl/ref/sources/"
    },
    "sources_release_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_release_date/"
    },
    "sources_update_date": {
      "@id": "https://www.variotdbs.pl/ref/sources_update_date/"
    },
    "threat_type": {
      "@id": "https://www.variotdbs.pl/ref/threat_type/"
    },
    "title": {
      "@id": "https://www.variotdbs.pl/ref/title/"
    },
    "type": {
      "@id": "https://www.variotdbs.pl/ref/type/"
    }
  },
  "@id": "https://www.variotdbs.pl/vuln/VAR-200404-0032",
  "affected_products": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/affected_products#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "model": "proventia a series xpu",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iss",
        "version": "22.1"
      },
      {
        "model": "proventia a series xpu",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iss",
        "version": "20.11"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iss",
        "version": "22.2"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iss",
        "version": "7.0"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 1.6,
        "vendor": "iss",
        "version": "22.3"
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "7.0"
      },
      {
        "model": "blackice server protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ccf"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.1"
      },
      {
        "model": "proventia a series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.4"
      },
      {
        "model": "blackice agent server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6eca"
      },
      {
        "model": "proventia m series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "1.4"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.6"
      },
      {
        "model": "proventia m series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "1.3"
      },
      {
        "model": "realsecure guard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecc"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.5_win_sr3.9"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.0.1_win_sr1.1"
      },
      {
        "model": "blackice server protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6cce"
      },
      {
        "model": "proventia a series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.2"
      },
      {
        "model": "proventia m series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "1.5"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecf"
      },
      {
        "model": "proventia a series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.3"
      },
      {
        "model": "blackice pc protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6cbz"
      },
      {
        "model": "proventia m series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "1.8"
      },
      {
        "model": "blackice server protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6cbz"
      },
      {
        "model": "realsecure sentry",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecc"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ece"
      },
      {
        "model": "blackice server protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ccc"
      },
      {
        "model": "blackice agent server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecc"
      },
      {
        "model": "blackice pc protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6cca"
      },
      {
        "model": "blackice pc protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ccd"
      },
      {
        "model": "blackice agent server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecf"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "7.0ebf"
      },
      {
        "model": "proventia a series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.6"
      },
      {
        "model": "proventia a series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.7"
      },
      {
        "model": "blackice pc protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ccb"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecd"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.5"
      },
      {
        "model": "proventia a series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.9"
      },
      {
        "model": "proventia m series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "1.6"
      },
      {
        "model": "proventia a series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.5"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.4"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.5_win_sr3.10"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.11"
      },
      {
        "model": "blackice agent server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecd"
      },
      {
        "model": "realsecure guard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6eca"
      },
      {
        "model": "realsecure guard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecb"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "7.0ebh"
      },
      {
        "model": "realsecure guard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ebz"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "7.0eba"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "7.0ebg"
      },
      {
        "model": "blackice pc protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ccf"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.5_win_sr3.4"
      },
      {
        "model": "proventia m series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "1.7"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.5_win_sr3.7"
      },
      {
        "model": "realsecure sentry",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6eca"
      },
      {
        "model": "realsecure sentry",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecb"
      },
      {
        "model": "realsecure sentry",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ebz"
      },
      {
        "model": "blackice agent server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecb"
      },
      {
        "model": "blackice agent server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ebz"
      },
      {
        "model": "blackice pc protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6cce"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "7.0ebk"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.7"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.5_win_sr3.1"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.9"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.0.1"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.10"
      },
      {
        "model": "proventia m series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "1.2"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.5"
      },
      {
        "model": "blackice pc protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ccc"
      },
      {
        "model": "realsecure guard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecf"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.5_win_sr3.6"
      },
      {
        "model": "proventia a series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.8"
      },
      {
        "model": "blackice server protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6cca"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "7.0ebl"
      },
      {
        "model": "blackice server protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ccd"
      },
      {
        "model": "realsecure guard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ece"
      },
      {
        "model": "realsecure sentry",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecf"
      },
      {
        "model": "proventia m series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "1.1"
      },
      {
        "model": "blackice server protection",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ccb"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.0"
      },
      {
        "model": "realsecure sentry",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ece"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "7.0ebj"
      },
      {
        "model": "blackice agent server",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ece"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.5_win_sr3.8"
      },
      {
        "model": "realsecure guard",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecd"
      },
      {
        "model": "proventia a series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.10"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "6.5_win_sr3.5"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6eca"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecb"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ebz"
      },
      {
        "model": "realsecure sentry",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "3.6ecd"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "22.8"
      },
      {
        "model": "proventia m series xpu",
        "scope": "eq",
        "trust": 1.0,
        "vendor": "iss",
        "version": "1.9"
      },
      {
        "model": null,
        "scope": null,
        "trust": 0.8,
        "vendor": "internet security",
        "version": null
      },
      {
        "model": "blackice agent for server",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "3.6 ecf before"
      },
      {
        "model": "blackice pc protection",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "3.6 ccf before"
      },
      {
        "model": "blackice server protection",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "3.6 ccf before"
      },
      {
        "model": "proventia a series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "xpu 22.11 before"
      },
      {
        "model": "proventia g series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "xpu 22.11 before"
      },
      {
        "model": "proventia m series",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "xpu 1.9 before"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "3.6 ecf before"
      },
      {
        "model": "realsecure desktop",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "7.0 ebl before"
      },
      {
        "model": "realsecure guard",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "3.6 ecf before"
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "7.0"
      },
      {
        "model": "realsecure network sensor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "xpu 22.11 before"
      },
      {
        "model": "realsecure sentry",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "3.6 ecf before"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "6.5 for windows sr 3.10 before"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "7.0"
      },
      {
        "model": "realsecure server sensor",
        "scope": "eq",
        "trust": 0.8,
        "vendor": "the internet security",
        "version": "xpu 22.11 before"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.9"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.8"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.7"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.6"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.5"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.4"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.3"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.2"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.11"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.10"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.1"
      },
      {
        "model": "security systems realsecure server sensor win sr3.9",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure server sensor win sr3.8",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure server sensor win sr3.7",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure server sensor win sr3.6",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure server sensor win sr3.5",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure server sensor win sr3.4",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure server sensor win sr3.3",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure server sensor win sr3.2",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure server sensor win sr3.10",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure server sensor win sr3.1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure server sensor win",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure server sensor win sr1.1",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.0.1"
      },
      {
        "model": "security systems realsecure server sensor win",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.0.1"
      },
      {
        "model": "security systems realsecure server sensor win",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.0"
      },
      {
        "model": "security systems realsecure sentry ecd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure sentry ecf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure sentry ece",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure sentry ecc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure sentry ecb",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure sentry eca",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure sentry ebz",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure network sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.4"
      },
      {
        "model": "security systems realsecure network sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.9"
      },
      {
        "model": "security systems realsecure network sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.10"
      },
      {
        "model": "security systems realsecure network sensor xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.020.11"
      },
      {
        "model": "security systems realsecure network sensor",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.0"
      },
      {
        "model": "security systems realsecure guard ecd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure guard ecf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure guard ece",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure guard ecc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure guard ecb",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure guard eca",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure guard ebz",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure desktop ebl",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.0"
      },
      {
        "model": "security systems realsecure desktop ebk",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.0"
      },
      {
        "model": "security systems realsecure desktop ebj",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.0"
      },
      {
        "model": "security systems realsecure desktop ebh",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.0"
      },
      {
        "model": "security systems realsecure desktop ebg",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.0"
      },
      {
        "model": "security systems realsecure desktop ebf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.0"
      },
      {
        "model": "security systems realsecure desktop eba",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.0"
      },
      {
        "model": "security systems realsecure desktop ecf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure desktop ece",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure desktop ecd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure desktop ecb",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure desktop eca",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure desktop ebz",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems proventia m series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "1.9"
      },
      {
        "model": "security systems proventia m series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "1.8"
      },
      {
        "model": "security systems proventia m series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "1.7"
      },
      {
        "model": "security systems proventia m series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "1.6"
      },
      {
        "model": "security systems proventia m series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "1.5"
      },
      {
        "model": "security systems proventia m series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "1.4"
      },
      {
        "model": "security systems proventia m series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "1.3"
      },
      {
        "model": "security systems proventia m series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "1.2"
      },
      {
        "model": "security systems proventia m series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "1.1"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "22.9"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "22.10"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "20.11"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "22.8"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "22.7"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "22.6"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "22.5"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "22.4"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "22.3"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "22.2"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "22.1"
      },
      {
        "model": "security systems blackice server protection ccf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice server protection cce",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice server protection ccd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice server protection ccc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice server protection ccb",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice server protection cca",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice server protection cbz",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice pc protection ccf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice pc protection cce",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice pc protection ccd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice pc protection ccc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice pc protection ccb",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice pc protection cca",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice pc protection .cbz",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice agent for server ecf",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice agent for server ece",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice agent for server ecd",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice agent for server ecc",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice agent for server ecb",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice agent for server eca",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice agent for server ebz",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.9"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.8"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.7"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.6"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.5"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.4"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.3"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.2"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.11"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.10"
      },
      {
        "model": "proventia g series xpu",
        "scope": "eq",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.1"
      },
      {
        "model": "security systems realsecure server sensor xpu",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.022.12"
      },
      {
        "model": "security systems realsecure server sensor win sr3.11",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "6.5"
      },
      {
        "model": "security systems realsecure network sensor xpu",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.020.12"
      },
      {
        "model": "security systems realsecure guard ecg",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems realsecure desktop ebm",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "7.0"
      },
      {
        "model": "security systems realsecure desktop ecg",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems proventia m series xpu",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "1.10"
      },
      {
        "model": "security systems proventia a series xpu",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "20.12"
      },
      {
        "model": "security systems blackice server protection ccg",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice pc protection ccg",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "security systems blackice agent for server ecg",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "internet",
        "version": "3.6"
      },
      {
        "model": "proventia g series xpu",
        "scope": "ne",
        "trust": 0.3,
        "vendor": "ibm",
        "version": "22.12"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#947254"
      },
      {
        "db": "BID",
        "id": "9913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000089"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200404-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0362"
      }
    ]
  },
  "configurations": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/configurations#",
      "children": {
        "@container": "@list"
      },
      "cpe_match": {
        "@container": "@list"
      },
      "data": {
        "@container": "@list"
      },
      "nodes": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "CVE_data_version": "4.0",
        "nodes": [
          {
            "cpe_match": [
              {
                "cpe22Uri": "cpe:/a:iss:blackice_agent_server",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:iss:blackice_pc_protection",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:iss:blackice_server_protection",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:iss:proventia_a_series_xpu",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iss:proventia_g_series_xpu",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/h:iss:proventia_m_series_xpu",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:iss:realsecure_desktop",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:iss:realsecure_guard",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:iss:realsecure_network_sensor",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:iss:realsecure_sentry",
                "vulnerable": true
              },
              {
                "cpe22Uri": "cpe:/a:iss:realsecure_server_sensor",
                "vulnerable": true
              }
            ],
            "operator": "OR"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000089"
      }
    ]
  },
  "credits": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/credits#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "eEye info@eEye.com",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200404-038"
      }
    ],
    "trust": 0.6
  },
  "cve": "CVE-2004-0362",
  "cvss": {
    "@context": {
      "cvssV2": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV2#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV2"
      },
      "cvssV3": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/cvss/cvssV3#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/cvssV3/"
      },
      "severity": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/cvss/severity#"
        },
        "@id": "https://www.variotdbs.pl/ref/cvss/severity"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        },
        "@id": "https://www.variotdbs.pl/ref/sources"
      }
    },
    "data": [
      {
        "cvssV2": [
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "nvd@nist.gov",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "CVE-2004-0362",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 1.8,
            "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
            "version": "2.0"
          },
          {
            "accessComplexity": "LOW",
            "accessVector": "NETWORK",
            "authentication": "NONE",
            "author": "VULHUB",
            "availabilityImpact": "PARTIAL",
            "baseScore": 7.5,
            "confidentialityImpact": "PARTIAL",
            "exploitabilityScore": 10.0,
            "id": "VHN-8792",
            "impactScore": 6.4,
            "integrityImpact": "PARTIAL",
            "severity": "HIGH",
            "trust": 0.1,
            "vectorString": "AV:N/AC:L/AU:N/C:P/I:P/A:P",
            "version": "2.0"
          }
        ],
        "cvssV3": [],
        "severity": [
          {
            "author": "nvd@nist.gov",
            "id": "CVE-2004-0362",
            "trust": 1.0,
            "value": "HIGH"
          },
          {
            "author": "CARNEGIE MELLON",
            "id": "VU#947254",
            "trust": 0.8,
            "value": "30.44"
          },
          {
            "author": "NVD",
            "id": "CVE-2004-0362",
            "trust": 0.8,
            "value": "High"
          },
          {
            "author": "CNNVD",
            "id": "CNNVD-200404-038",
            "trust": 0.6,
            "value": "HIGH"
          },
          {
            "author": "VULHUB",
            "id": "VHN-8792",
            "trust": 0.1,
            "value": "HIGH"
          }
        ]
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#947254"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8792"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000089"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200404-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0362"
      }
    ]
  },
  "description": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/description#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Multiple stack-based buffer overflows in the ICQ parsing routines of the ISS Protocol Analysis Module (PAM) component, as used in various RealSecure, Proventia, and BlackICE products, allow remote attackers to execute arbitrary code via a SRV_MULTI response containing a SRV_USER_ONLINE response packet and a SRV_META_USER response packet with long (1) nickname, (2) firstname, (3) lastname, or (4) email address fields, as exploited by the Witty worm. The Protocol Analysis Module (PAM) used by Internet Security Systems (ISS) intrusion detection and prevention products does not properly handle ICQ server response messages.  An unauthenticated, remote attacker could execute arbitrary code by sending a specially crafted UDP packet.  This issue exists due to insufficient bounds checking performed on certain unspecified ICQ protocol fields supplied in ICQ response data.  This attack would occur in the context of the vulnerable process. \nThis module is used to parse network protocols and is included in a number of products provided by ISS, including various RealSecure and BlackICE releases. To call these affected functions, an attacker simply needs to construct an SRV_USER_ONLINE reply containing two nested reply packets. Attackers can forge data frames and send them to networks, devices, and hosts protected by ISS products",
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0362"
      },
      {
        "db": "CERT/CC",
        "id": "VU#947254"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000089"
      },
      {
        "db": "BID",
        "id": "9913"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8792"
      }
    ],
    "trust": 2.7
  },
  "exploit_availability": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/exploit_availability#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "reference": "https://www.scap.org.cn/vuln/vhn-8792",
        "trust": 0.1,
        "type": "unknown"
      }
    ],
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-8792"
      }
    ]
  },
  "external_ids": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/external_ids#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "db": "BID",
        "id": "9913",
        "trust": 3.6
      },
      {
        "db": "CERT/CC",
        "id": "VU#947254",
        "trust": 3.3
      },
      {
        "db": "SECUNIA",
        "id": "11073",
        "trust": 2.5
      },
      {
        "db": "OSVDB",
        "id": "4355",
        "trust": 2.5
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0362",
        "trust": 2.5
      },
      {
        "db": "XF",
        "id": "15442",
        "trust": 1.4
      },
      {
        "db": "XF",
        "id": "15543",
        "trust": 1.4
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000089",
        "trust": 0.8
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200404-038",
        "trust": 0.7
      },
      {
        "db": "BUGTRAQ",
        "id": "20040318 EEYE: INTERNET SECURITY SYSTEMS PAM ICQ SERVER RESPONSE PROCESSING VULNERABILITY",
        "trust": 0.6
      },
      {
        "db": "ISS",
        "id": "20040318 VULNERABILITY IN ICQ PARSING IN ISS PRODUCTS",
        "trust": 0.6
      },
      {
        "db": "EEYE",
        "id": "AD20040318",
        "trust": 0.6
      },
      {
        "db": "CIAC",
        "id": "O-104",
        "trust": 0.6
      },
      {
        "db": "PACKETSTORM",
        "id": "83212",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "168",
        "trust": 0.1
      },
      {
        "db": "EXPLOIT-DB",
        "id": "16464",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-88874",
        "trust": 0.1
      },
      {
        "db": "SEEBUG",
        "id": "SSVID-70978",
        "trust": 0.1
      },
      {
        "db": "VULHUB",
        "id": "VHN-8792",
        "trust": 0.1
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#947254"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8792"
      },
      {
        "db": "BID",
        "id": "9913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000089"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200404-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0362"
      }
    ]
  },
  "id": "VAR-200404-0032",
  "iot": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/iot#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": true,
    "sources": [
      {
        "db": "VULHUB",
        "id": "VHN-8792"
      }
    ],
    "trust": 0.01
  },
  "last_update_date": "2024-08-14T14:48:11.422000Z",
  "patch": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/patch#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "title": "167",
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/alerts/id/167"
      },
      {
        "title": "166",
        "trust": 0.8,
        "url": "http://xforce.iss.net/xforce/alerts/id/166"
      },
      {
        "title": "ICQ_ISS_166",
        "trust": 0.8,
        "url": "http://www.isskk.co.jp/support/techinfo/general/ICQ_ISS_166.html"
      },
      {
        "title": "Witty_167",
        "trust": 0.8,
        "url": "http://www.isskk.co.jp/support/techinfo/general/Witty_167.html"
      }
    ],
    "sources": [
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000089"
      }
    ]
  },
  "problemtype_data": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/problemtype_data#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "problemtype": "NVD-CWE-Other",
        "trust": 1.0
      }
    ],
    "sources": [
      {
        "db": "NVD",
        "id": "CVE-2004-0362"
      }
    ]
  },
  "references": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/references#",
      "data": {
        "@container": "@list"
      },
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": [
      {
        "trust": 3.6,
        "url": "http://xforce.iss.net/xforce/alerts/id/166"
      },
      {
        "trust": 3.3,
        "url": "http://www.securityfocus.com/bid/9913"
      },
      {
        "trust": 2.8,
        "url": "http://www.eeye.com/html/research/advisories/ad20040318.html"
      },
      {
        "trust": 2.5,
        "url": "http://www.kb.cert.org/vuls/id/947254"
      },
      {
        "trust": 2.5,
        "url": "http://www.ciac.org/ciac/bulletins/o-104.shtml"
      },
      {
        "trust": 2.5,
        "url": "http://www.osvdb.org/4355"
      },
      {
        "trust": 1.9,
        "url": "http://xforce.iss.net/xforce/alerts/id/167"
      },
      {
        "trust": 1.7,
        "url": "http://secunia.com/advisories/11073"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/15543"
      },
      {
        "trust": 1.4,
        "url": "http://xforce.iss.net/xforce/xfdb/15442"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15442"
      },
      {
        "trust": 1.1,
        "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/15543"
      },
      {
        "trust": 1.0,
        "url": "http://marc.info/?l=bugtraq\u0026m=107965651712378\u0026w=2"
      },
      {
        "trust": 0.8,
        "url": "http://www.eeye.com/html/research/upcoming/20040308.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.iss.net/download/"
      },
      {
        "trust": 0.8,
        "url": "http://secunia.com/advisories/11073/"
      },
      {
        "trust": 0.8,
        "url": "http://www.caida.org/research/security/witty/"
      },
      {
        "trust": 0.8,
        "url": "http://cve.mitre.org/cgi-bin/cvename.cgi?name=cve-2004-0362"
      },
      {
        "trust": 0.8,
        "url": "http://jvn.jp/tr/trciac-o-104"
      },
      {
        "trust": 0.8,
        "url": "http://nvd.nist.gov/nvd.cfm?cvename=cve-2004-0362"
      },
      {
        "trust": 0.8,
        "url": "http://www.isskk.co.jp/support/techinfo/general/icq_iss_166.html"
      },
      {
        "trust": 0.8,
        "url": "http://www.isskk.co.jp/support/techinfo/general/witty_167.html"
      },
      {
        "trust": 0.6,
        "url": "http://marc.theaimsgroup.com/?l=bugtraq\u0026m=107965651712378\u0026w=2"
      },
      {
        "trust": 0.3,
        "url": "http://support.coresecurity.com/impact/exploits/cf012333dc243844422b2f4849ac394c.html"
      },
      {
        "trust": 0.3,
        "url": "/archive/1/357916"
      },
      {
        "trust": 0.1,
        "url": "http://marc.info/?l=bugtraq\u0026amp;m=107965651712378\u0026amp;w=2"
      }
    ],
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#947254"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8792"
      },
      {
        "db": "BID",
        "id": "9913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000089"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200404-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0362"
      }
    ]
  },
  "sources": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "db": "CERT/CC",
        "id": "VU#947254"
      },
      {
        "db": "VULHUB",
        "id": "VHN-8792"
      },
      {
        "db": "BID",
        "id": "9913"
      },
      {
        "db": "JVNDB",
        "id": "JVNDB-2004-000089"
      },
      {
        "db": "CNNVD",
        "id": "CNNVD-200404-038"
      },
      {
        "db": "NVD",
        "id": "CVE-2004-0362"
      }
    ]
  },
  "sources_release_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_release_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2004-03-20T00:00:00",
        "db": "CERT/CC",
        "id": "VU#947254"
      },
      {
        "date": "2004-04-15T00:00:00",
        "db": "VULHUB",
        "id": "VHN-8792"
      },
      {
        "date": "2004-03-18T00:00:00",
        "db": "BID",
        "id": "9913"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000089"
      },
      {
        "date": "2004-03-18T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200404-038"
      },
      {
        "date": "2004-04-15T04:00:00",
        "db": "NVD",
        "id": "CVE-2004-0362"
      }
    ]
  },
  "sources_update_date": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/sources_update_date#",
      "data": {
        "@container": "@list"
      }
    },
    "data": [
      {
        "date": "2009-06-12T00:00:00",
        "db": "CERT/CC",
        "id": "VU#947254"
      },
      {
        "date": "2017-07-11T00:00:00",
        "db": "VULHUB",
        "id": "VHN-8792"
      },
      {
        "date": "2004-03-18T00:00:00",
        "db": "BID",
        "id": "9913"
      },
      {
        "date": "2007-04-01T00:00:00",
        "db": "JVNDB",
        "id": "JVNDB-2004-000089"
      },
      {
        "date": "2006-06-15T00:00:00",
        "db": "CNNVD",
        "id": "CNNVD-200404-038"
      },
      {
        "date": "2017-07-11T01:30:06.120000",
        "db": "NVD",
        "id": "CVE-2004-0362"
      }
    ]
  },
  "threat_type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/threat_type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "remote",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200404-038"
      }
    ],
    "trust": 0.6
  },
  "title": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/title#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "Internet Security Systems Protocol Analysis Module (PAM) does not properly handle ICQ server response messages",
    "sources": [
      {
        "db": "CERT/CC",
        "id": "VU#947254"
      }
    ],
    "trust": 0.8
  },
  "type": {
    "@context": {
      "@vocab": "https://www.variotdbs.pl/ref/type#",
      "sources": {
        "@container": "@list",
        "@context": {
          "@vocab": "https://www.variotdbs.pl/ref/sources#"
        }
      }
    },
    "data": "unknown",
    "sources": [
      {
        "db": "CNNVD",
        "id": "CNNVD-200404-038"
      }
    ],
    "trust": 0.6
  }
}


Log in or create an account to share your comment.




Tags
Taxonomy of the tags.


Loading…

Loading…

Loading…

Sightings

Author Source Type Date

Nomenclature

  • Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
  • Confirmed: The vulnerability is confirmed from an analyst perspective.
  • Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
  • Patched: This vulnerability was successfully patched by the user reporting the sighting.
  • Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
  • Not confirmed: The user expresses doubt about the veracity of the vulnerability.
  • Not patched: This vulnerability was not successfully patched by the user reporting the sighting.