Vulnerability Note VU#814627
Sendmail vulnerable to buffer overflow when DNS map is specified using TXT records
A remotely exploitable buffer overflow exists in Sendmail, versions 8.12.0 through 8.12.4. This vulnerability only exhibits itself if you have modified the configuration file to look up TXT records in DNS.
The buffer overflow occurs in the portion of code that process responses from DNS servers. Please note that the Sendmail Consortium has indicated that this vulnerability is not present in the standard Sendmail distribution because the option that can trigger the exposure is not enabled. For more details, please see the Sendmail announcement.
A remote attacker may be able to execute arbitrary code with the privileges of the Sendmail daemon, typically root. Note that there is no known exploit for this vulnerability.
Upgrade to Sendmail 8.12.5 or apply the appropriate vendor-supplied patch.
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|Apple Computer Inc.||Affected||-||20 Dec 2004|
|Sendmail||Affected||-||28 Jun 2002|
|Sun Microsystems Inc.||Affected||-||20 Dec 2004|
CVSS Metrics (Learn More)
The CERT/CC thanks Eric Allman and Gregory Shapiro for helping us construct this document.
This document was written by Ian A Finlay and Jeffrey Havrilla.
- CVE IDs: CVE-2002-0906
- Date Public: 25 Jun 2002
- Date First Published: 28 Jun 2002
- Date Last Updated: 20 Dec 2004
- Severity Metric: 28.35
- Document Revision: 31
If you have feedback, comments, or additional information about this vulnerability, please send us email.