Show plain JSON{"id": "CVE-2011-3579", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 6.4, "accessVector": "NETWORK", "vectorString": "AV:N/AC:L/Au:N/C:P/I:N/A:P", "authentication": "NONE", "integrityImpact": "NONE", "accessComplexity": "LOW", "availabilityImpact": "PARTIAL", "confidentialityImpact": "PARTIAL"}, "acInsufInfo": false, "impactScore": 4.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 10.0, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false}]}, "published": "2011-09-30T17:55:01.180", "references": [{"url": "http://archives.neohapsis.com/archives/bugtraq/2011-09/0145.html", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://securityreason.com/securityalert/8404", "source": "cve@mitre.org"}, {"url": "http://securitytracker.com/id?1026093", "source": "cve@mitre.org"}, {"url": "http://www.osvdb.org/75721", "source": "cve@mitre.org"}, {"url": "http://www.securityfocus.com/bid/49753", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/70025", "source": "cve@mitre.org"}, {"url": "https://www.trustwave.com/spiderlabs/advisories/TWSL2011-013.txt", "tags": ["Exploit"], "source": "cve@mitre.org"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-399"}]}], "descriptions": [{"lang": "en", "value": "server/webmail.php in IceWarp WebMail in IceWarp Mail Server before 10.3.3 allows remote attackers to read arbitrary files, and possibly send HTTP requests to intranet servers or cause a denial of service (CPU and memory consumption), via an XML external entity declaration in conjunction with an entity reference."}, {"lang": "es", "value": "server/webmail.php en IceWarp WebMail en el servidor de correo IceWarp anteriores a v10.3.3 permite a atacantes remotos leer ficheros arbitrarios, y posiblemente enviar peticiones HTTP a los servidores de la intranet o causar una denegaci\u00f3n de servicio (Agotamiento de CPU y de memoria), a trav\u00e9s de una entidad externa XML declaraci\u00f3n en relaci\u00f3n con una referencia de entidad."}], "lastModified": "2017-08-29T01:30:16.927", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:icewarp:mail_server:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E11FB6B8-D2E7-4F76-B38C-FF90517A6EFF", "versionEndIncluding": "10.3.2"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:9.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "22B17040-1D48-4BCC-8AB8-CE275630AB92"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:9.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FF60A80C-6148-4234-87F7-9E5226C05293"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:9.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CC90647F-D741-436E-812D-950A0A69AE28"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:9.4.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A7603560-8C55-4A46-BE89-BB2D03F5B111"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:9.4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B56EBDA-600D-4091-BF31-717DAC195EBC"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:9.4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E50E0941-3BDD-496A-A533-181C50C315AF"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DE9442E4-0468-4FAD-8470-A89BB6DEF8EB"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3D52315B-50BA-447A-85D2-1119CA464B78"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "20816B82-986E-44F1-9188-34A1827231C5"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.0.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "12060349-5779-435C-BDC9-4ECDA6277BA3"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5D7BF916-C278-435C-8E8E-5F67BDC1DB48"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "99FE1579-35EC-4C6C-A63A-E3DBC0F7FD72"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A72083C1-0045-4929-B705-0610C5E0CA17"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5316DDD8-84F0-4F1B-8A6C-FFFAF78C0686"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.2.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "75359877-B017-47A5-9ADE-9B9FDEBB3F1F"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64D4A427-889F-4928-B535-636A2A7D85AB"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "51F02A0D-378E-4150-B105-B826B6AC1553"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.3.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C3C8D192-0E1A-4379-995A-B294E2FD1EB2"}, {"criteria": "cpe:2.3:a:icewarp:mail_server:10.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E2ADA889-C52D-4C80-96EB-834489654614"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}