7.5

CVE-2006-4434

Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."

Data is provided by the National Vulnerability Database (NVD)
SendmailSendmail Version < 8.13.8
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 7.03% 0.912
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:N/A:P
CWE-416 Use After Free

The product reuses or references memory after it has been freed. At some point afterward, the memory may be allocated again and saved in another pointer, while the original pointer references a location somewhere within the new allocation. Any operations using the original pointer are no longer valid because the memory "belongs" to the code that operates on the new pointer.

http://secunia.com/advisories/21749
Vendor Advisory
Broken Link
http://secunia.com/advisories/21637
Patch
Vendor Advisory
Broken Link
http://secunia.com/advisories/21641
Patch
Vendor Advisory
Broken Link
http://secunia.com/advisories/21696
Vendor Advisory
Broken Link
http://secunia.com/advisories/21700
Vendor Advisory
Broken Link
http://secunia.com/advisories/22369
Vendor Advisory
Broken Link
http://securitytracker.com/id?1016753
Patch
Third Party Advisory
Broken Link
VDB Entry
http://www.securityfocus.com/bid/19714
Patch
Third Party Advisory
Broken Link
VDB Entry