10

CVE-2003-0161

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.

Data is provided by the National Vulnerability Database (NVD)
SendmailSendmail Version2.6
SendmailSendmail Version2.6.1
SendmailSendmail Version2.6.2
SendmailSendmail Version3.0
SendmailSendmail Version3.0.1
SendmailSendmail Version3.0.2
SendmailSendmail Version3.0.3
SendmailSendmail Version8.9.0
SendmailSendmail Version8.9.1
SendmailSendmail Version8.9.2
SendmailSendmail Version8.9.3
SendmailSendmail Version8.10
SendmailSendmail Version8.10.1
SendmailSendmail Version8.10.2
SendmailSendmail Version8.11.0
SendmailSendmail Version8.11.1
SendmailSendmail Version8.11.2
SendmailSendmail Version8.11.3
SendmailSendmail Version8.11.4
SendmailSendmail Version8.11.5
SendmailSendmail Version8.11.6
SendmailSendmail Version8.12 Updatebeta10
SendmailSendmail Version8.12 Updatebeta12
SendmailSendmail Version8.12 Updatebeta16
SendmailSendmail Version8.12 Updatebeta5
SendmailSendmail Version8.12 Updatebeta7
SendmailSendmail Version8.12.0
SendmailSendmail Version8.12.1
SendmailSendmail Version8.12.2
SendmailSendmail Version8.12.3
SendmailSendmail Version8.12.4
SendmailSendmail Version8.12.5
SendmailSendmail Version8.12.6
SendmailSendmail Version8.12.7
SendmailSendmail Version8.12.8
SendmailSendmail Switch Version2.1
SendmailSendmail Switch Version2.1.1
SendmailSendmail Switch Version2.1.2
SendmailSendmail Switch Version2.1.3
SendmailSendmail Switch Version2.1.4
SendmailSendmail Switch Version2.1.5
SendmailSendmail Switch Version2.2
SendmailSendmail Switch Version2.2.1
SendmailSendmail Switch Version2.2.2
SendmailSendmail Switch Version2.2.3
SendmailSendmail Switch Version2.2.4
SendmailSendmail Switch Version2.2.5
SendmailSendmail Switch Version3.0
SendmailSendmail Switch Version3.0.1
SendmailSendmail Switch Version3.0.2
SendmailSendmail Switch Version3.0.3
CompaqTru64 Version4.0b
CompaqTru64 Version4.0d
CompaqTru64 Version4.0d_pk9_bl17
CompaqTru64 Version4.0f
CompaqTru64 Version4.0f_pk6_bl17
CompaqTru64 Version4.0f_pk7_bl18
CompaqTru64 Version4.0g
CompaqTru64 Version4.0g_pk3_bl17
CompaqTru64 Version5.0
CompaqTru64 Version5.0_pk4_bl17
CompaqTru64 Version5.0_pk4_bl18
CompaqTru64 Version5.0a
CompaqTru64 Version5.0a_pk3_bl17
CompaqTru64 Version5.0f
CompaqTru64 Version5.1
CompaqTru64 Version5.1_pk3_bl17
CompaqTru64 Version5.1_pk4_bl18
CompaqTru64 Version5.1_pk5_bl19
CompaqTru64 Version5.1_pk6_bl20
CompaqTru64 Version5.1a
CompaqTru64 Version5.1a_pk1_bl1
CompaqTru64 Version5.1a_pk2_bl2
CompaqTru64 Version5.1a_pk3_bl3
CompaqTru64 Version5.1b
CompaqTru64 Version5.1b_pk1_bl1
HpHp-ux Version10.00
HpHp-ux Version10.01
HpHp-ux Version10.08
HpHp-ux Version10.09
HpHp-ux Version10.10
HpHp-ux Version10.16
HpHp-ux Version10.20
HpHp-ux Version10.24
HpHp-ux Version10.26
HpHp-ux Version10.30
HpHp-ux Version10.34
HpHp-ux Version11.00
HpHp-ux Version11.0.4
HpHp-ux Version11.11
HpHp-ux Version11.20
HpHp-ux Version11.22
HpHp-ux Series 700 Version10.20
HpHp-ux Series 800 Version10.20
HpSis
SunSolaris Version2.4 Editionx86
SunSolaris Version2.5 Editionx86
SunSolaris Version2.5.1 Editionppc
SunSolaris Version2.5.1 Editionx86
SunSolaris Version2.6
SunSolaris Version7.0 Editionx86
SunSolaris Version8.0 Editionx86
SunSolaris Version9.0 Editionsparc
SunSolaris Version9.0 Editionx86
SunSolaris Version9.0 Updatex86_update_2
SunSunos Version-
SunSunos Version5.4
SunSunos Version5.5
SunSunos Version5.5.1
SunSunos Version5.7
SunSunos Version5.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 71.95% 0.987
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 10 10 10
AV:N/AC:L/Au:N/C:C/I:C/A:C
http://www.cert.org/advisories/CA-2003-12.html
Patch
Third Party Advisory
US Government Resource