Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
References
Configurations
Configuration 1 (hide)
|
History
20 Nov 2024, 23:43
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://patches.sgi.com/support/free/security/advisories/20030101-01-P - | |
References | () http://secunia.com/advisories/7826 - Vendor Advisory | |
References | () http://securitytracker.com/id?1005748 - Patch | |
References | () http://www.securityfocus.com/bid/6548 - Patch | |
References | () http://www.sendmail.org/8.12.7.html - Patch, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2009/3539 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/10775 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6892 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8512 - |
Information
Published : 2002-12-31 05:00
Updated : 2024-11-20 23:43
NVD link : CVE-2002-2261
Mitre link : CVE-2002-2261
CVE.ORG link : CVE-2002-2261
JSON object : View
Products Affected
sendmail
- sendmail
CWE
CWE-264
Permissions, Privileges, and Access Controls