CVE-2001-0713
https://notcve.org/view.php?id=CVE-2001-0713
Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the configuration file whose names contain characters with the high bit set, such as (1) macro names that are one character long, (2) a variable setting which is processed by the setoption function, or (3) a Modifiers setting which is processed by the getmodifiers function. • http://razor.bindview.com/publish/advisories/adv_sm812.html http://www.iss.net/security_center/static/7192.php http://www.securityfocus.com/bid/3377 •
CVE-2001-0715
https://notcve.org/view.php?id=CVE-2001-0715
Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to obtain potentially sensitive information about the mail queue by setting debugging flags to enable debug mode. • ftp://patches.sgi.com/support/free/security/advisories/20011101-01-I http://razor.bindview.com/publish/advisories/adv_sm812.html •
CVE-2000-0319
https://notcve.org/view.php?id=CVE-2000-0319
mail.local in Sendmail 8.10.x does not properly identify the .\n string which identifies the end of message text, which allows a remote attacker to cause a denial of service or corrupt mailboxes via a message line that is 2047 characters long and ends in .\n. • http://www.securityfocus.com/bid/1146 http://www.securityfocus.com/templates/archive.pike?list=1&msg=2694.000424%40SECURITY.NNOV.RU •
CVE-1999-1592
https://notcve.org/view.php?id=CVE-1999-1592
Multiple unspecified vulnerabilities in sendmail 5, as installed on Sun SunOS 4.1.3_U1 and 4.1.4, have unspecified attack vectors and impact. NOTE: this might overlap CVE-1999-0129. • http://sunsolve.sun.com/search/document.do?assetkey=1-22-00159-1 http://www.securityfocus.com/bid/243 •
CVE-1999-1109 – Eric Allman Sendmail 8.9.1/8.9.3 - ETRN Denial of Service
https://notcve.org/view.php?id=CVE-1999-1109
Sendmail before 8.10.0 allows remote attackers to cause a denial of service by sending a series of ETRN commands then disconnecting from the server, while Sendmail continues to process the commands after the connection has been terminated. • https://www.exploit-db.com/exploits/19701 http://marc.info/?l=bugtraq&m=94632241202626&w=2 http://marc.info/?l=bugtraq&m=94780566911948&w=2 http://www.iss.net/security_center/static/7760.php http://www.securityfocus.com/bid/904 •