Overview
Sendmail contains a buffer overflow vulnerability in the code that parses rulesets. This vulnerability could allow a remote attacker to execute arbitrary code or cause a denial of service on a vulnerable system.This vulnerability does not affect the default configuration.
Description
Sendmail is a widely used mail transfer agent (MTA). There is a buffer overflow vulnerability in the code that parses rulesets. A system is vulnerable if it is configured to use the non-standard rulesets recipient (2), final (4), or mailer-specific envelope recipients. This is a different vulnerability than the one described in CA-2003-25/VU#784980. |
Impact
Exploitation of this vulnerability could allow a remote attacker to execute arbitrary code or cause a denial of service on a vulnerable system. |
Solution
This issue is resolved in Sendmail 8.12.10.Beta2. |
Vendor Information
CVSS Metrics
Group | Score | Vector |
---|---|---|
Base | ||
Temporal | ||
Environmental |
References
Acknowledgements
Thanks to Timo Sirainen for reporting this vulnerability.
This document was written by Jason A Rafail.
Other Information
CVE IDs: | None |
Severity Metric: | 6.33 |
Date Public: | 2003-07-01 |
Date First Published: | 2003-09-18 |
Date Last Updated: | 2003-09-18 20:34 UTC |
Document Revision: | 7 |