Show filters
49 Total Results
Displaying 11-20 of 49
Sort by:
Attacker Value
Unknown

CVE-2006-0058

Disclosure Date: March 22, 2006 (last updated February 22, 2025)
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
0
Attacker Value
Unknown

CVE-2005-2070

Disclosure Date: June 29, 2005 (last updated February 22, 2025)
The ClamAV Mail fILTER (clamav-milter) 0.84 through 0.85d, when used in Sendmail using long timeouts, allows remote attackers to cause a denial of service by keeping an open connection, which prevents ClamAV from reloading.
0
Attacker Value
Unknown

CVE-2003-0688

Disclosure Date: October 20, 2003 (last updated February 22, 2025)
The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data.
0
Attacker Value
Unknown

CVE-2003-0694

Disclosure Date: October 06, 2003 (last updated February 22, 2025)
The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
0
Attacker Value
Unknown

CVE-2003-0681

Disclosure Date: October 06, 2003 (last updated February 22, 2025)
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
0
Attacker Value
Unknown

CVE-2003-0308

Disclosure Date: May 15, 2003 (last updated February 22, 2025)
The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl.
0
Attacker Value
Unknown

CVE-2003-0161

Disclosure Date: April 02, 2003 (last updated February 22, 2025)
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
0
Attacker Value
Unknown

CVE-2002-1337

Disclosure Date: March 07, 2003 (last updated February 22, 2025)
Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
0
Attacker Value
Unknown

CVE-2002-2423

Disclosure Date: December 31, 2002 (last updated February 22, 2025)
Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remote attackers to prevent the IP address from being logged via a long IDENT response.
0
Attacker Value
Unknown

CVE-2002-2261

Disclosure Date: December 31, 2002 (last updated February 22, 2025)
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
0