Vulnerabilities > CVE-1999-0130
Attack vector
LOCAL Attack complexity
LOW Privileges required
NONE Confidentiality impact
COMPLETE Integrity impact
COMPLETE Availability impact
COMPLETE Summary
Local users can start Sendmail in daemon mode and gain root privileges.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 | |
Application | 4 | |
OS | 1 | |
OS | 2 | |
OS | 4 | |
OS | 1 | |
OS | 1 |
Exploit-Db
description | BSD/OS 2.1,Caldera Network Desktop 1.0,Eric Allman Sendmail. CVE-1999-0130. Local exploits for multiple platform |
id | EDB-ID:19556 |
last seen | 2016-02-02 |
modified | 1996-11-16 |
published | 1996-11-16 |
reporter | Leshka Zakharoff |
source | https://www.exploit-db.com/download/19556/ |
title | BSD 2,CND 1,Sendmail 8.x,FreeBSD 2.1.x,HP-UX 10.x,AIX 4,RedHat 4 Sendmail Daemon Vuln |
Nessus
NASL family | SMTP problems |
NASL id | SENDMAIL_DAEMON_MODE.NASL |
description | The remote Sendmail server, according to its version number, allows local user to start it in daemon mode and gain root privileges. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11346 |
published | 2003-03-11 |
reporter | This script is Copyright (C) 2003-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/11346 |
title | Sendmail < 8.8.3 Daemon Mode Local Privilege Escalation |
code |
|