CVE-2002-2261
https://notcve.org/view.php?id=CVE-2002-2261
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname. • ftp://patches.sgi.com/support/free/security/advisories/20030101-01-P http://secunia.com/advisories/7826 http://securitytracker.com/id?1005748 http://www.securityfocus.com/bid/6548 http://www.sendmail.org/8.12.7.html http://www.vupen.com/english/advisories/2009/3539 https://exchange.xforce.ibmcloud.com/vulnerabilities/10775 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6892 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ov • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2001-0714
https://notcve.org/view.php?id=CVE-2001-0714
Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to cause a denial of service (data loss) by (1) setting a high initial message hop count option (-h), which causes Sendmail to drop queue entries, (2) via the -qR option, or (3) via the -qS option. • ftp://patches.sgi.com/support/free/security/advisories/20011101-01-I http://razor.bindview.com/publish/advisories/adv_sm812.html •
CVE-2001-0713
https://notcve.org/view.php?id=CVE-2001-0713
Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the configuration file whose names contain characters with the high bit set, such as (1) macro names that are one character long, (2) a variable setting which is processed by the setoption function, or (3) a Modifiers setting which is processed by the getmodifiers function. • http://razor.bindview.com/publish/advisories/adv_sm812.html http://www.iss.net/security_center/static/7192.php http://www.securityfocus.com/bid/3377 •
CVE-2001-0715
https://notcve.org/view.php?id=CVE-2001-0715
Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to obtain potentially sensitive information about the mail queue by setting debugging flags to enable debug mode. • ftp://patches.sgi.com/support/free/security/advisories/20011101-01-I http://razor.bindview.com/publish/advisories/adv_sm812.html •
CVE-2001-0653 – Sendmail 8.11/8.12 Debugger - Arbitrary Code Execution
https://notcve.org/view.php?id=CVE-2001-0653
Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number. • https://www.exploit-db.com/exploits/21060 https://www.exploit-db.com/exploits/21061 https://www.exploit-db.com/exploits/21062 https://www.exploit-db.com/exploits/21063 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-017.txt.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000412 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-032-01 http://marc.info/?l=bugtraq&m=99841063100516&w=2 http://rhn.redhat.com/errata/RHSA- •