CVE-2006-4434
https://notcve.org/view.php?id=CVE-2006-4434
Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected." Vulnerabilidad Utilizar-tras-liberar en Sendmail versiones anteriores a 8.13.8, permite a atacantes remotos provocar una denegación de servicio (crash) mediante una "header line" larga, que provoca que una variable liberada anteriormente sea referenciada. NOTa: El desarrollador original ha impugnado la severidad de esta vulnerabilidad diciendo "La única denegación de servicio posible aquí, es llenar el disco con volcados de memoria si el Sistema Operativo genera diferentes volcados de memoria (que es improbable)... el error reside en el código de apagado (finis()) que conduce directamente a exit(3), en este caso, el proceso terminaría de todas formas, no afecta a la distribución ni recepción de correo". • http://secunia.com/advisories/21637 http://secunia.com/advisories/21641 http://secunia.com/advisories/21696 http://secunia.com/advisories/21700 http://secunia.com/advisories/21749 http://secunia.com/advisories/22369 http://securitytracker.com/id?1016753 http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1 http://www.attrition.org/pipermail/vim/2006-August/000999.html http://www.debian.org/security/2006/dsa-1164 http://www.mandriva.com/security/advisories?name=M • CWE-416: Use After Free •
CVE-2006-1173
https://notcve.org/view.php?id=CVE-2006-1173
Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files. • ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635 http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html http://secunia.com/advisories/15779 http://secunia.com/advisories/20473 http://secunia.com/advisories/20641 http://secunia. • CWE-399: Resource Management Errors •
CVE-2006-0058 – Sendmail 8.13.5 - Remote Signal Handling (PoC)
https://notcve.org/view.php?id=CVE-2006-0058
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations. • https://www.exploit-db.com/exploits/2051 ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-010.txt.asc ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.24/SCOSA-2006.24.txt ftp://patches.sgi.com/support/free/security/advisories/20060302-01-P ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&am •