CVE-1999-0131
https://notcve.org/view.php?id=CVE-1999-0131
Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users. • http://www.securityfocus.com/bid/717 •
CVE-1999-0203
https://notcve.org/view.php?id=CVE-1999-0203
In Sendmail, attackers can gain root privileges via SMTP by specifying an improper "mail from" address and an invalid "rcpt to" address that would cause the mail to bounce to a program. • https://exchange.xforce.ibmcloud.com/vulnerabilities/CVE-1999-0203 •
CVE-1999-0145
https://notcve.org/view.php?id=CVE-1999-0145
Sendmail WIZ command enabled, allowing root access. Sendmail WIZ comando habilitado, permite el acceso de root • http://seclists.org/fulldisclosure/2019/Jun/16 http://www.alw.nih.gov/Security/Docs/admin-guide-to-cracking.101.html http://www.cert.org/advisories/CA-1990-11.html http://www.cert.org/advisories/CA-1993-14.html http://www.openwall.com/lists/oss-security/2019/06/05/4 http://www.openwall.com/lists/oss-security/2019/06/06/1 http://www2.dataguard.no/bugtraq/1995_1/0332.html •
CVE-1999-0095 – Berkeley Sendmail 5.58 - Debug
https://notcve.org/view.php?id=CVE-1999-0095
The debug command in Sendmail is enabled, allowing attackers to execute commands as root. El comando de depuración de Sendmail está activado, permitiendo a atacantes ejecutar comandos como root. • https://www.exploit-db.com/exploits/19028 http://seclists.org/fulldisclosure/2019/Jun/16 http://www.openwall.com/lists/oss-security/2019/06/05/4 http://www.openwall.com/lists/oss-security/2019/06/06/1 http://www.osvdb.org/195 http://www.securityfocus.com/bid/1 •