Vulnerabilities > Sendmail > Sendmail > 8.12.4

DATE CVE VULNERABILITY TITLE RISK
2003-10-06 CVE-2003-0681 Buffer Overflow vulnerability in Sendmail Ruleset Parsing
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
network
low complexity
sendmail apple gentoo hp ibm netbsd openbsd turbolinux
7.5
2003-04-02 CVE-2003-0161 The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
network
low complexity
sendmail compaq hp sun
critical
10.0
2002-12-31 CVE-2002-2423 Improper Input Validation vulnerability in Sendmail
Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remote attackers to prevent the IP address from being logged via a long IDENT response.
network
low complexity
sendmail CWE-20
6.4
2002-12-31 CVE-2002-2261 Permissions, Privileges, and Access Controls vulnerability in Sendmail
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
network
low complexity
sendmail CWE-264
7.5
2002-10-11 CVE-2002-1165 Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified.
local
low complexity
sendmail netbsd
4.6
2002-10-04 CVE-2002-0906 Buffer Overflow vulnerability in Sendmail DNS Map TXT Record
Buffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server.
network
low complexity
sendmail
7.5