Vulnerabilities > Sendmail > Sendmail > 8.11.2

DATE CVE VULNERABILITY TITLE RISK
2003-04-02 CVE-2003-0161 The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
network
low complexity
sendmail compaq hp sun
critical
10.0
2002-12-31 CVE-2002-2261 Permissions, Privileges, and Access Controls vulnerability in Sendmail
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
network
low complexity
sendmail CWE-264
7.5
2002-12-31 CVE-2002-1827 Denial Of Service vulnerability in Sendmail File Locking
Sendmail 8.9.0 through 8.12.3 allows local users to cause a denial of service by obtaining an exclusive lock on the (1) alias, (2) map, (3) statistics, and (4) pid files.
local
low complexity
sendmail
2.1
2001-10-30 CVE-2001-0715 Unspecified vulnerability in Sendmail
Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to obtain potentially sensitive information about the mail queue by setting debugging flags to enable debug mode.
local
low complexity
sendmail
2.1
2001-10-30 CVE-2001-0714 Unspecified vulnerability in Sendmail
Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to cause a denial of service (data loss) by (1) setting a high initial message hop count option (-h), which causes Sendmail to drop queue entries, (2) via the -qR option, or (3) via the -qS option.
local
low complexity
sendmail
2.1
2001-10-30 CVE-2001-0713 Unspecified vulnerability in Sendmail
Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the configuration file whose names contain characters with the high bit set, such as (1) macro names that are one character long, (2) a variable setting which is processed by the setoption function, or (3) a Modifiers setting which is processed by the getmodifiers function.
local
low complexity
sendmail
4.6
2001-09-20 CVE-2001-0653 Unspecified vulnerability in Sendmail
Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number.
local
low complexity
sendmail
4.6
2001-05-28 CVE-2001-1349 Unspecified vulnerability in Sendmail
Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers.
local
high complexity
sendmail
3.7