Vulnerability Note VU#108964
Sendmail contains buffer overflow in ruleset parsing
Sendmail contains a buffer overflow vulnerability in the code that parses rulesets. This vulnerability could allow a remote attacker to execute arbitrary code or cause a denial of service on a vulnerable system.This vulnerability does not affect the default configuration.
Sendmail is a widely used mail transfer agent (MTA). There is a buffer overflow vulnerability in the code that parses rulesets. A system is vulnerable if it is configured to use the non-standard rulesets recipient (2), final (4), or mailer-specific envelope recipients.
Exploitation of this vulnerability could allow a remote attacker to execute arbitrary code or cause a denial of service on a vulnerable system.
This issue is resolved in Sendmail 8.12.10.Beta2.
or the open-source version from:
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Sendmail||Affected||-||18 Sep 2003|
|Sendmail Inc.||Affected||-||18 Sep 2003|
CVSS Metrics (Learn More)
Thanks to Timo Sirainen for reporting this vulnerability.
This document was written by Jason A Rafail.
- CVE IDs: Unknown
- Date Public: 01 Jul 2003
- Date First Published: 18 Sep 2003
- Date Last Updated: 18 Sep 2003
- Severity Metric: 6.33
- Document Revision: 7
If you have feedback, comments, or additional information about this vulnerability, please send us email.