Last Modified: Oct. 11, 2017
Multiple vulnerabilities in multiple vendor implementations of the Secure/Multipurpose Internet Mail Extensions (S/MIME) protocol allow remote attackers to cause a denial of service and possibly execute arbitrary code via an S/MIME email message containing certain unexpected ASN.1 constructs, as demonstrated using the NISSC test suite.
Access Vector: Network
Access Complexity: Low
Authentication: None
Confidentiality Impact: None
Integrity Impact: None
Availability Impact: Partial
Base Score: 5.0
Exploitability Score: 10.0
Impact Score: 2.9
CVSS V2: AV:N/AC:L/Au:N/C:N/I:N/A:P
NVD-CWE-Other
Condition | Configuration | |
---|---|---|
OR | ||
OR | ||
cpe:2.3:a:hitachi:pki_runtime_library:*:*:*:*:*:*:*:* Part: a Vendor: hitachi | Alle Schwachstellen für hitachi | |
cpe:2.3:a:hitachi:groupmax_mail_-_security_option:6.0:*:*:*:*:*:*:* Part: a Vendor: hitachi | Alle Schwachstellen für hitachi |
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:hitachi:pki_runtime_library:*:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:hitachi:groupmax_mail_-_security_option:6.0:*:*:*:*:*:*:*"/> </set> <prop key="program_influence" value="input"/> <prop key="range" value="remote"/> </set>
<?xml version="1.0" ?> <set operator="and"> <set operator="or"> <prop key="application" value="cpe:2.3:a:hitachi:pki_runtime_library:*:*:*:*:*:*:*:*"/> <prop key="application" value="cpe:2.3:a:hitachi:groupmax_mail_-_security_option:6.0:*:*:*:*:*:*:*"/> </set> <set operator="or"> <prop key="program_influence" value="input"/> <prop key="program_influence" value="existence"/> </set> <prop key="range" value="remote"/> </set>