Vulnerabilities > CVE-2002-0906 - Unspecified vulnerability in Sendmail

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
sendmail
nessus

Summary

Buffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server.

Nessus

NASL familySMTP problems
NASL idSENDMAIL_DNS_MAP_TXT_OVERFLOW.NASL
descriptionThe remote Sendmail server, according to its version number, may be vulnerable to a buffer overflow in its DNS handling code. The owner of a malicious name server could use this flaw to cause a denial of service and possibly to execute arbitrary code on this host.
last seen2020-06-01
modified2020-06-02
plugin id11232
published2003-02-17
reporterThis script is Copyright (C) 2003-2018 and is owned by Tenable, Inc. or an Affiliate thereof.
sourcehttps://www.tenable.com/plugins/nessus/11232
titleSendmail Custom DNS Map TXT Query Overflow
code
#
# (C) Tenable Network Security, Inc.
#

include("compat.inc");

if (description)
{
  script_id(11232);
  script_version("1.24");
  script_cvs_date("Date: 2018/09/17 21:46:53");

  script_cve_id("CVE-2002-0906");
  script_bugtraq_id(5122);

  script_name(english:"Sendmail Custom DNS Map TXT Query Overflow");
  script_summary(english:"Check Sendmail version number");

  script_set_attribute(attribute:"synopsis", value:"Arbitrary code may be run on this host.");
  script_set_attribute(attribute:"description", value:
"The remote Sendmail server, according to its version number, may be 
vulnerable to a buffer overflow in its DNS handling code.

The owner of a malicious name server could use this flaw to cause a
denial of service and possibly to execute arbitrary code on this
host.");
  script_set_attribute(attribute:"solution", value:
"Upgrade to Sendmail 8.12.5 or later.");
  script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
  script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
  script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L");
  script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
  script_set_attribute(attribute:"cvss_score_source", value:"CVE-2002-0906");
  script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
  script_set_attribute(attribute:"exploit_available", value:"false");

  script_set_attribute(attribute:"vuln_publication_date", value:"2002/06/26");
  script_set_attribute(attribute:"plugin_publication_date", value:"2003/02/17");

  script_set_attribute(attribute:"plugin_type", value:"remote");
  script_set_attribute(attribute:"cpe", value:"cpe:/a:sendmail:sendmail");
  script_end_attributes();

  script_category(ACT_GATHER_INFO);
  script_copyright(english:"This script is Copyright (C) 2003-2018 and is owned by Tenable, Inc. or an Affiliate thereof.");
  script_family(english: "SMTP problems");

  script_dependencies("sendmail_detect.nbin");
  script_require_keys("installed_sw/Sendmail");
  exit(0);
}

include("vcf.inc");

app_info = vcf::get_app_info(app:"Sendmail");

constraints = [{ "fixed_version" : "8.12.5" }];

vcf::check_version_and_report(app_info:app_info, constraints:constraints, severity:SECURITY_HOLE);

Oval

accepted2005-05-11T05:41:00.000-04:00
classvulnerability
contributors
  • nameBrian Soby
    organizationThe MITRE Corporation
  • nameBrian Soby
    organizationThe MITRE Corporation
descriptionBuffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server.
familyunix
idoval:org.mitre.oval:def:2183
statusaccepted
submitted2004-12-22T12:00:00.000-04:00
titleSendmail Custom DNS Map Buffer Overflow
version35