{"api_version":"1","generated_at":"2026-04-23T07:55:24+00:00","cve":"CVE-2004-0309","urls":{"html":"https://cve.report/CVE-2004-0309","api":"https://cve.report/api/cve/CVE-2004-0309.json","docs":"https://cve.report/api","cve_org":"https://www.cve.org/CVERecord?id=CVE-2004-0309","nvd":"https://nvd.nist.gov/vuln/detail/CVE-2004-0309"},"summary":{"title":"CVE-2004-0309","description":"Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument.","state":"PUBLISHED","assigner":"mitre","published_at":"2004-11-23 05:00:00","updated_at":"2025-04-03 01:03:51"},"problem_types":["NVD-CWE-Other","n/a"],"metrics":[{"version":"2.0","source":"nvd@nist.gov","type":"Primary","score":"10","severity":"","vector":"AV:N/AC:L/Au:N/C:C/I:C/A:C","data":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"}}],"references":[{"url":"http://marc.info/?l=bugtraq&m=107722656827427&w=2","name":"http://marc.info/?l=bugtraq&m=107722656827427&w=2","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"'EEYE: ZoneLabs SMTP Processing Buffer Overflow' - MARC","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.securityfocus.com/bid/9696","name":"http://www.securityfocus.com/bid/9696","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"],"title":"Zone Labs ZoneAlarm SMTP Remote Buffer Overflow Vulnerability","mime":"text/html","httpstatus":"200","archivestatus":"0"},{"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/14991","name":"https://exchange.xforce.ibmcloud.com/vulnerabilities/14991","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"IBM X-Force Exchange","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.osvdb.org/3991","name":"http://www.osvdb.org/3991","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"","httpstatus":"-1","archivestatus":"0"},{"url":"http://www.ciac.org/ciac/bulletins/o-084.shtml","name":"http://www.ciac.org/ciac/bulletins/o-084.shtml","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"","mime":"text/html","httpstatus":"-1","archivestatus":"200"},{"url":"http://download.zonelabs.com/bin/free/securityAlert/8.html","name":"http://download.zonelabs.com/bin/free/securityAlert/8.html","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":[],"title":"Zone Labs: Security Alert","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"http://www.kb.cert.org/vuls/id/619982","name":"http://www.kb.cert.org/vuls/id/619982","refsource":"af854a3a-2127-422b-91ae-364da2661108","tags":["Third Party Advisory","US Government Resource"],"title":"US-CERT Vulnerability Note VU#619982","mime":"text/html","httpstatus":"200","archivestatus":"200"},{"url":"https://www.cve.org/CVERecord?id=CVE-2004-0309","name":"CVE Program record","refsource":"CVE.ORG","tags":["canonical"]},{"url":"https://nvd.nist.gov/vuln/detail/CVE-2004-0309","name":"NVD vulnerability detail","refsource":"NVD","tags":["canonical","analysis"]}],"affected":[{"source":"CNA","vendor":"n/a","product":"n/a","version":"affected n/a","platforms":[]}],"timeline":[],"solutions":[],"workarounds":[],"exploits":[],"credits":[],"nvd_cpes":[{"cve_year":"2004","cve_id":"309","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zonelabs","cpe5":"integrity","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"309","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zonelabs","cpe5":"zonealarm","cpe6":"4.0","cpe7":"*","cpe8":"*","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"309","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zonelabs","cpe5":"zonealarm","cpe6":"4.0","cpe7":"*","cpe8":"plus","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"309","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zonelabs","cpe5":"zonealarm","cpe6":"4.0","cpe7":"*","cpe8":"pro","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"},{"cve_year":"2004","cve_id":"309","vulnerable":"1","versionEndIncluding":"","cpe1":"cpe","cpe2":"2.3","cpe3":"a","cpe4":"zonelabs","cpe5":"zonealarm","cpe6":"4.5","cpe7":"*","cpe8":"pro","cpe9":"*","cpe10":"*","cpe11":"*","cpe12":"*","cpe13":"*"}],"vendor_comments":[],"enrichments":{"kev":null,"epss":null,"legacy_qids":[]},"source_records":{"cve_program":{"containers":{"adp":[{"providerMetadata":{"dateUpdated":"2024-08-08T00:17:14.041Z","orgId":"af854a3a-2127-422b-91ae-364da2661108","shortName":"CVE"},"references":[{"name":"3991","tags":["vdb-entry","x_refsource_OSVDB","x_transferred"],"url":"http://www.osvdb.org/3991"},{"tags":["x_refsource_CONFIRM","x_transferred"],"url":"http://download.zonelabs.com/bin/free/securityAlert/8.html"},{"name":"20040219 EEYE: ZoneLabs SMTP Processing Buffer Overflow","tags":["mailing-list","x_refsource_BUGTRAQ","x_transferred"],"url":"http://marc.info/?l=bugtraq&m=107722656827427&w=2"},{"name":"9696","tags":["vdb-entry","x_refsource_BID","x_transferred"],"url":"http://www.securityfocus.com/bid/9696"},{"name":"VU#619982","tags":["third-party-advisory","x_refsource_CERT-VN","x_transferred"],"url":"http://www.kb.cert.org/vuls/id/619982"},{"name":"O-084","tags":["third-party-advisory","government-resource","x_refsource_CIAC","x_transferred"],"url":"http://www.ciac.org/ciac/bulletins/o-084.shtml"},{"name":"zonelabs-multiple-products-bo(14991)","tags":["vdb-entry","x_refsource_XF","x_transferred"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/14991"}],"title":"CVE Program Container"}],"cna":{"affected":[{"product":"n/a","vendor":"n/a","versions":[{"status":"affected","version":"n/a"}]}],"datePublic":"2004-02-19T00:00:00.000Z","descriptions":[{"lang":"en","value":"Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument."}],"problemTypes":[{"descriptions":[{"description":"n/a","lang":"en","type":"text"}]}],"providerMetadata":{"dateUpdated":"2004-08-18T00:00:00.000Z","orgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","shortName":"mitre"},"references":[{"name":"3991","tags":["vdb-entry","x_refsource_OSVDB"],"url":"http://www.osvdb.org/3991"},{"tags":["x_refsource_CONFIRM"],"url":"http://download.zonelabs.com/bin/free/securityAlert/8.html"},{"name":"20040219 EEYE: ZoneLabs SMTP Processing Buffer Overflow","tags":["mailing-list","x_refsource_BUGTRAQ"],"url":"http://marc.info/?l=bugtraq&m=107722656827427&w=2"},{"name":"9696","tags":["vdb-entry","x_refsource_BID"],"url":"http://www.securityfocus.com/bid/9696"},{"name":"VU#619982","tags":["third-party-advisory","x_refsource_CERT-VN"],"url":"http://www.kb.cert.org/vuls/id/619982"},{"name":"O-084","tags":["third-party-advisory","government-resource","x_refsource_CIAC"],"url":"http://www.ciac.org/ciac/bulletins/o-084.shtml"},{"name":"zonelabs-multiple-products-bo(14991)","tags":["vdb-entry","x_refsource_XF"],"url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/14991"}],"x_legacyV4Record":{"CVE_data_meta":{"ASSIGNER":"cve@mitre.org","ID":"CVE-2004-0309","STATE":"PUBLIC"},"affects":{"vendor":{"vendor_data":[{"product":{"product_data":[{"product_name":"n/a","version":{"version_data":[{"version_value":"n/a"}]}}]},"vendor_name":"n/a"}]}},"data_format":"MITRE","data_type":"CVE","data_version":"4.0","description":{"description_data":[{"lang":"eng","value":"Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument."}]},"problemtype":{"problemtype_data":[{"description":[{"lang":"eng","value":"n/a"}]}]},"references":{"reference_data":[{"name":"3991","refsource":"OSVDB","url":"http://www.osvdb.org/3991"},{"name":"http://download.zonelabs.com/bin/free/securityAlert/8.html","refsource":"CONFIRM","url":"http://download.zonelabs.com/bin/free/securityAlert/8.html"},{"name":"20040219 EEYE: ZoneLabs SMTP Processing Buffer Overflow","refsource":"BUGTRAQ","url":"http://marc.info/?l=bugtraq&m=107722656827427&w=2"},{"name":"9696","refsource":"BID","url":"http://www.securityfocus.com/bid/9696"},{"name":"VU#619982","refsource":"CERT-VN","url":"http://www.kb.cert.org/vuls/id/619982"},{"name":"O-084","refsource":"CIAC","url":"http://www.ciac.org/ciac/bulletins/o-084.shtml"},{"name":"zonelabs-multiple-products-bo(14991)","refsource":"XF","url":"https://exchange.xforce.ibmcloud.com/vulnerabilities/14991"}]}}}},"cveMetadata":{"assignerOrgId":"8254265b-2729-46b6-b9e3-3dfca2d5bfca","assignerShortName":"mitre","cveId":"CVE-2004-0309","datePublished":"2004-09-01T04:00:00.000Z","dateReserved":"2004-03-17T00:00:00.000Z","dateUpdated":"2024-08-08T00:17:14.041Z","state":"PUBLISHED"},"dataType":"CVE_RECORD","dataVersion":"5.1"},"nvd":{"publishedDate":"2004-11-23 05:00:00","lastModifiedDate":"2025-04-03 01:03:51","problem_types":["NVD-CWE-Other","n/a"],"metrics":{"cvssMetricV2":[{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"2.0","vectorString":"AV:N/AC:L/Au:N/C:C/I:C/A:C","baseScore":10,"accessVector":"NETWORK","accessComplexity":"LOW","authentication":"NONE","confidentialityImpact":"COMPLETE","integrityImpact":"COMPLETE","availabilityImpact":"COMPLETE"},"baseSeverity":"HIGH","exploitabilityScore":10,"impactScore":10,"acInsufInfo":false,"obtainAllPrivilege":true,"obtainUserPrivilege":false,"obtainOtherPrivilege":false,"userInteractionRequired":false}]},"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:zonelabs:integrity:4.0:*:*:*:*:*:*:*","matchCriteriaId":"9963B823-D70B-4B3D-ABFE-14C4AC64E5D4"},{"vulnerable":true,"criteria":"cpe:2.3:a:zonelabs:zonealarm:4.0:*:*:*:*:*:*:*","matchCriteriaId":"2A0C79EE-6E92-4DE9-BD94-135A9FB14F2C"},{"vulnerable":true,"criteria":"cpe:2.3:a:zonelabs:zonealarm:4.0:*:plus:*:*:*:*:*","matchCriteriaId":"1A125DEF-6DE6-41FE-BD43-DA464DB14389"},{"vulnerable":true,"criteria":"cpe:2.3:a:zonelabs:zonealarm:4.0:*:pro:*:*:*:*:*","matchCriteriaId":"721EFD0A-145F-440C-A9FC-D72AE6FA126A"},{"vulnerable":true,"criteria":"cpe:2.3:a:zonelabs:zonealarm:4.5:*:pro:*:*:*:*:*","matchCriteriaId":"C5DE7D02-A778-47EF-9D3E-871C3EB09370"}]}]}]},"legacy_mitre":{"record":{"CveYear":"2004","CveId":"309","Ordinal":"1","Title":"CVE-2004-0309","CVE":"CVE-2004-0309","Year":"2004"},"notes":[{"CveYear":"2004","CveId":"309","Ordinal":"1","NoteData":"Stack-based buffer overflow in the SMTP service support in vsmon.exe in Zone Labs ZoneAlarm before 4.5.538.001, ZoneLabs Integrity client 4.0 before 4.0.146.046, and 4.5 before 4.5.085, allows remote attackers to execute arbitrary code via a long RCPT TO argument.","Type":"Description","Title":"CVE-2004-0309"},{"CveYear":"2004","CveId":"309","Ordinal":"2","NoteData":"2004-09-01","Type":"Other","Title":"Published"},{"CveYear":"2004","CveId":"309","Ordinal":"3","NoteData":"2004-08-17","Type":"Other","Title":"Modified"}]}}}