Unknown
CVE-2003-0161
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
Unknown
(0 users assessed)Unknown
(0 users assessed)Unknown
Unknown
Unknown
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special “NOCHAR” control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- compaq,
- hp,
- sendmail,
- sun
Products
- hp-ux 10.00,
- hp-ux 10.01,
- hp-ux 10.08,
- hp-ux 10.09,
- hp-ux 10.10,
- hp-ux 10.16,
- hp-ux 10.20,
- hp-ux 10.24,
- hp-ux 10.26,
- hp-ux 10.30,
- hp-ux 10.34,
- hp-ux 11.0.4,
- hp-ux 11.00,
- hp-ux 11.11,
- hp-ux 11.20,
- hp-ux 11.22,
- hp-ux series 700 10.20,
- hp-ux series 800 10.20,
- sendmail 2.6,
- sendmail 2.6.1,
- sendmail 2.6.2,
- sendmail 3.0,
- sendmail 3.0.1,
- sendmail 3.0.2,
- sendmail 3.0.3,
- sendmail 8.10,
- sendmail 8.10.1,
- sendmail 8.10.2,
- sendmail 8.11.0,
- sendmail 8.11.1,
- sendmail 8.11.2,
- sendmail 8.11.3,
- sendmail 8.11.4,
- sendmail 8.11.5,
- sendmail 8.11.6,
- sendmail 8.12,
- sendmail 8.12.0,
- sendmail 8.12.1,
- sendmail 8.12.2,
- sendmail 8.12.3,
- sendmail 8.12.4,
- sendmail 8.12.5,
- sendmail 8.12.6,
- sendmail 8.12.7,
- sendmail 8.12.8,
- sendmail 8.9.0,
- sendmail 8.9.1,
- sendmail 8.9.2,
- sendmail 8.9.3,
- sendmail switch 2.1,
- sendmail switch 2.1.1,
- sendmail switch 2.1.2,
- sendmail switch 2.1.3,
- sendmail switch 2.1.4,
- sendmail switch 2.1.5,
- sendmail switch 2.2,
- sendmail switch 2.2.1,
- sendmail switch 2.2.2,
- sendmail switch 2.2.3,
- sendmail switch 2.2.4,
- sendmail switch 2.2.5,
- sendmail switch 3.0,
- sendmail switch 3.0.1,
- sendmail switch 3.0.2,
- sendmail switch 3.0.3,
- sis,
- solaris 2.4,
- solaris 2.5,
- solaris 2.5.1,
- solaris 2.6,
- solaris 7.0,
- solaris 8.0,
- solaris 9.0,
- sunos -,
- sunos 5.4,
- sunos 5.5,
- sunos 5.5.1,
- sunos 5.7,
- sunos 5.8,
- tru64 4.0b,
- tru64 4.0d,
- tru64 4.0d pk9 bl17,
- tru64 4.0f,
- tru64 4.0f pk6 bl17,
- tru64 4.0f pk7 bl18,
- tru64 4.0g,
- tru64 4.0g pk3 bl17,
- tru64 5.0,
- tru64 5.0 pk4 bl17,
- tru64 5.0 pk4 bl18,
- tru64 5.0a,
- tru64 5.0a pk3 bl17,
- tru64 5.0f,
- tru64 5.1,
- tru64 5.1 pk3 bl17,
- tru64 5.1 pk4 bl18,
- tru64 5.1 pk5 bl19,
- tru64 5.1 pk6 bl20,
- tru64 5.1a,
- tru64 5.1a pk1 bl1,
- tru64 5.1a pk2 bl2,
- tru64 5.1a pk3 bl3,
- tru64 5.1b,
- tru64 5.1b pk1 bl1
References
Advisory
Additional Info
Technical Analysis
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: