Vulnerabilities > CVE-2001-0714 - Unspecified vulnerability in Sendmail
Attack vector
UNKNOWN Attack complexity
UNKNOWN Privileges required
UNKNOWN Confidentiality impact
UNKNOWN Integrity impact
UNKNOWN Availability impact
UNKNOWN sendmail
nessus
Summary
Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to cause a denial of service (data loss) by (1) setting a high initial message hop count option (-h), which causes Sendmail to drop queue entries, (2) via the -qR option, or (3) via the -qS option.
Vulnerable Configurations
Nessus
NASL family | SMTP problems |
NASL id | SENDMAIL_QUEUE_DESTRUCTION.NASL |
description | The remote Sendmail server, according to its version number, might be vulnerable to a queue destruction when a local user runs sendmail -q -h1000 If your system does not allow users to process the queue (which is the default), you are not vulnerable. Note that this vulnerability is _local_ only. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 11087 |
published | 2002-08-18 |
reporter | This script is Copyright (C) 2002-2018 and is owned by Tenable, Inc. or an Affiliate thereof. |
source | https://www.tenable.com/plugins/nessus/11087 |
title | Sendmail < 8.12.1 RestrictQueueRun Option Multiple Argument Local DoS |
code |
|