U.S. flag   An official website of the United States government
Dot gov

Official websites use .gov
A .gov website belongs to an official government organization in the United States.

Https

Secure .gov websites use HTTPS
A lock (Dot gov) or https:// means you've safely connected to the .gov website. Share sensitive information only on official, secure websites.

Vulnerability Change Records for CVE-2020-11503

Change History

Initial Analysis by NIST 6/23/2020 4:06:23 PM

Action Type Old Value New Value
Added CVSS V3.1

								
							
							
						
NIST AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Added CVSS V2

								
							
							
						
NIST (AV:N/AC:L/Au:N/C:P/I:P/A:P)
Added CWE

								
							
							
						
NIST CWE-787
Added CPE Configuration

								
							
							
						
AND
     OR
          *cpe:2.3:o:sophos:sfos:*:*:*:*:*:*:*:* versions up to (excluding) 17.5
          *cpe:2.3:o:sophos:sfos:17.5:-:*:*:*:*:*:*
          *cpe:2.3:o:sophos:sfos:17.5:maintenance_release1:*:*:*:*:*:*
          *cpe:2.3:o:sophos:sfos:17.5:maintenance_release10:*:*:*:*:*:*
          *cpe:2.3:o:sophos:sfos:17.5:maintenance_release11:*:*:*:*:*:*
          *cpe:2.3:o:sophos:sfos:17.5:maintenance_release2:*:*:*:*:*:*
          *cpe:2.3:o:sophos:sfos:17.5:maintenance_release3:*:*:*:*:*:*
          *cpe:2.3:o:sophos:sfos:17.5:maintenance_release4:*:*:*:*:*:*
          *cpe:2.3:o:sophos:sfos:17.5:maintenance_release5:*:*:*:*:*:*
          *cpe:2.3:o:sophos:sfos:17.5:maintenance_release6:*:*:*:*:*:*
          *cpe:2.3:o:sophos:sfos:17.5:maintenance_release7:*:*:*:*:*:*
          *cpe:2.3:o:sophos:sfos:17.5:maintenance_release8:*:*:*:*:*:*
          *cpe:2.3:o:sophos:sfos:17.5:maintenance_release9:*:*:*:*:*:*
     OR
          cpe:2.3:h:sophos:xg_firewall:-:*:*:*:*:*:*:*
Changed Reference Type
https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503 No Types Assigned
https://community.sophos.com/b/security-blog/posts/advisory-potential-rce-through-heap-overflow-in-awarrensmtp-cve-2020-11503 Vendor Advisory