Page 2 of 19 results (0.006 seconds)

CVSS: 10.0EPSS: 86%CPEs: 28EXPL: 4

07 Mar 2003 — Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. Desbordamiento de búfer en Sendmail 5.79 a la 8.12.7 que permite a atacantes remotos la ejecución arbitraria de código mediante ciertos campos de dirección formateados, relativos a comentarios de cabecera de emisor y receptor, procesados por la función crackaddr del fichero heade... • https://www.exploit-db.com/exploits/411 • CWE-120: Buffer Copy without Checking Size of Input ('Classic Buffer Overflow') •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

12 Oct 2001 — Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the configuration file whose names contain characters with the high bit set, such as (1) macro names that are one character long, (2) a variable setting which is processed by the setoption function, or (3) a Modifiers setting which is processed by the getmodifiers function. • http://razor.bindview.com/publish/advisories/adv_sm812.html •

CVSS: 6.2EPSS: 0%CPEs: 1EXPL: 0

12 Oct 2001 — Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to cause a denial of service (data loss) by (1) setting a high initial message hop count option (-h), which causes Sendmail to drop queue entries, (2) via the -qR option, or (3) via the -qS option. • ftp://patches.sgi.com/support/free/security/advisories/20011101-01-I •

CVSS: 5.5EPSS: 0%CPEs: 1EXPL: 1

12 Oct 2001 — Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to obtain potentially sensitive information about the mail queue by setting debugging flags to enable debug mode. • ftp://patches.sgi.com/support/free/security/advisories/20011101-01-I •

CVSS: 7.5EPSS: 0%CPEs: 19EXPL: 0

23 Apr 2000 — mail.local in Sendmail 8.10.x does not properly identify the .\n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 2047 characters long and ends in .\n. • http://www.securityfocus.com/bid/1146 •

CVSS: 7.5EPSS: 3%CPEs: 1EXPL: 1

22 Dec 1999 — Sendmail before 8.10.0 allows remote attackers to cause a denial of service by sending a series of ETRN commands then disconnecting from the server, while Sendmail continues to process the commands after the connection has been terminated. • https://www.exploit-db.com/exploits/19701 •

CVSS: 7.5EPSS: 4%CPEs: 1EXPL: 0

01 Dec 1998 — Denial of service in HP-UX sendmail 8.8.6 related to accepting connections. • http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=HPSBUX9904-097 •

CVSS: 7.2EPSS: 0%CPEs: 19EXPL: 0

11 Sep 1996 — Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. • http://www.securityfocus.com/bid/717 •

CVSS: 7.8EPSS: 0%CPEs: 1EXPL: 0

30 Aug 1996 — Sendmail before 8.6.7 allows local users to gain root access via a large value in the debug (-d) command line option. • http://www.cert.org/advisories/CA-94.12.sendmail.vulnerabilities •