Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
20 Nov 2024, 23:41
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc - Broken Link | |
References | () ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6 - Broken Link | |
References | () ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5 - Broken Link | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P - Broken Link | |
References | () http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571 - Broken Link | |
References | () http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028 - Broken Link | |
References | () http://marc.info/?l=bugtraq&m=104673778105192&w=2 - Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=104678739608479&w=2 - Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=104678862109841&w=2 - Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=104678862409849&w=2 - Third Party Advisory | |
References | () http://marc.info/?l=bugtraq&m=104679411316818&w=2 - Third Party Advisory | |
References | () http://www-1.ibm.com/support/search.wss?rs=0&q=IY40500&apar=only - Broken Link | |
References | () http://www-1.ibm.com/support/search.wss?rs=0&q=IY40501&apar=only - Broken Link | |
References | () http://www-1.ibm.com/support/search.wss?rs=0&q=IY40502&apar=only - Broken Link | |
References | () http://www.cert.org/advisories/CA-2003-07.html - Broken Link, Patch, Third Party Advisory, US Government Resource | |
References | () http://www.debian.org/security/2003/dsa-257 - Broken Link | |
References | () http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950 - Broken Link, Patch, Vendor Advisory | |
References | () http://www.iss.net/security_center/static/10748.php - Broken Link | |
References | () http://www.kb.cert.org/vuls/id/398025 - Third Party Advisory, US Government Resource | |
References | () http://www.redhat.com/support/errata/RHSA-2003-073.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2003-074.html - Broken Link | |
References | () http://www.redhat.com/support/errata/RHSA-2003-227.html - Broken Link | |
References | () http://www.securityfocus.com/bid/6991 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | () http://www.sendmail.org/8.12.8.html - Broken Link, Patch, Vendor Advisory | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222 - Broken Link |
09 Feb 2024, 03:19
Type | Values Removed | Values Added |
---|---|---|
CPE | cpe:2.3:a:sendmail:sendmail:3.0:*:nt:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:* cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:* cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:* cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:2.6.1:*:nt:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:3.0.2:*:nt:*:*:*:*:* cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:* cpe:2.3:a:sgi:freeware:1.0:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:* cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:3.0.1:*:nt:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:2.6:*:nt:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:* cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:* |
cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:* cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:* cpe:2.3:o:oracle:solaris:2.6:*:*:*:*:*:*:* cpe:2.3:o:oracle:solaris:7.0:*:*:*:*:*:*:* |
First Time |
Oracle solaris
Oracle |
|
CWE | CWE-120 | |
References | (SGI) ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P - Broken Link | |
References | (OVAL) https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222 - Broken Link | |
References | (DEBIAN) http://www.debian.org/security/2003/dsa-257 - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2003-227.html - Broken Link | |
References | (CERT-VN) http://www.kb.cert.org/vuls/id/398025 - Third Party Advisory, US Government Resource | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2003-073.html - Broken Link | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=104678862409849&w=2 - Third Party Advisory | |
References | (AIXAPAR) http://www-1.ibm.com/support/search.wss?rs=0&q=IY40501&apar=only - Broken Link | |
References | (ISS) http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950 - Broken Link, Patch, Vendor Advisory | |
References | (AIXAPAR) http://www-1.ibm.com/support/search.wss?rs=0&q=IY40500&apar=only - Broken Link | |
References | (REDHAT) http://www.redhat.com/support/errata/RHSA-2003-074.html - Broken Link | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=104678862109841&w=2 - Third Party Advisory | |
References | (XF) http://www.iss.net/security_center/static/10748.php - Broken Link | |
References | (BID) http://www.securityfocus.com/bid/6991 - Broken Link, Exploit, Patch, Third Party Advisory, VDB Entry, Vendor Advisory | |
References | (CALDERA) ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5 - Broken Link | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=104678739608479&w=2 - Third Party Advisory | |
References | (CONFIRM) http://www.sendmail.org/8.12.8.html - Broken Link, Patch, Vendor Advisory | |
References | (HP) http://marc.info/?l=bugtraq&m=104679411316818&w=2 - Third Party Advisory | |
References | (CONECTIVA) http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571 - Broken Link | |
References | (CALDERA) ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6 - Broken Link | |
References | (NETBSD) ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc - Broken Link | |
References | (CERT) http://www.cert.org/advisories/CA-2003-07.html - Broken Link, Patch, Third Party Advisory, US Government Resource | |
References | (AIXAPAR) http://www-1.ibm.com/support/search.wss?rs=0&q=IY40502&apar=only - Broken Link | |
References | (BUGTRAQ) http://marc.info/?l=bugtraq&m=104673778105192&w=2 - Third Party Advisory | |
References | (MANDRAKE) http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028 - Broken Link |
Information
Published : 2003-03-07 05:00
Updated : 2024-11-20 23:41
NVD link : CVE-2002-1337
Mitre link : CVE-2002-1337
CVE.ORG link : CVE-2002-1337
JSON object : View
Products Affected
netbsd
- netbsd
windriver
- platform_sa
- bsdos
hp
- hp-ux
- alphaserver_sc
sendmail
- sendmail
gentoo
- linux
sun
- sunos
oracle
- solaris
CWE
CWE-120
Buffer Copy without Checking Size of Input ('Classic Buffer Overflow')