Vulnerabilities > Sendmail

DATE CVE VULNERABILITY TITLE RISK
2006-03-22 CVE-2006-0058 Remote Code Execution vulnerability in Sendmail Asynchronous Signal Handling
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
network
high complexity
sendmail
7.6
2005-06-29 CVE-2005-2070 Remote Denial Of Service Weakness in Sendmail Milter
The ClamAV Mail fILTER (clamav-milter) 0.84 through 0.85d, when used in Sendmail using long timeouts, allows remote attackers to cause a denial of service by keeping an open connection, which prevents ClamAV from reloading.
network
low complexity
sendmail
5.0
2003-10-20 CVE-2003-0688 The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data.
network
low complexity
redhat sendmail sgi compaq freebsd openbsd
5.0
2003-10-06 CVE-2003-0694 The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
network
low complexity
sendmail sgi apple compaq freebsd gentoo hp ibm netbsd sun turbolinux
critical
10.0
2003-10-06 CVE-2003-0681 Buffer Overflow vulnerability in Sendmail Ruleset Parsing
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
network
low complexity
sendmail apple gentoo hp ibm netbsd openbsd turbolinux
7.5
2003-05-15 CVE-2003-0308 Local Security vulnerability in Sendmail
The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl.
local
low complexity
sendmail debian
7.2
2003-04-02 CVE-2003-0161 The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
network
low complexity
sendmail compaq hp sun
critical
10.0
2002-12-31 CVE-2002-2423 Improper Input Validation vulnerability in Sendmail
Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remote attackers to prevent the IP address from being logged via a long IDENT response.
network
low complexity
sendmail CWE-20
6.4
2002-12-31 CVE-2002-2261 Permissions, Privileges, and Access Controls vulnerability in Sendmail
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
network
low complexity
sendmail CWE-264
7.5
2002-12-31 CVE-2002-1827 Denial Of Service vulnerability in Sendmail File Locking
Sendmail 8.9.0 through 8.12.3 allows local users to cause a denial of service by obtaining an exclusive lock on the (1) alias, (2) map, (3) statistics, and (4) pid files.
local
low complexity
sendmail
2.1