CVE-2002-2261
https://notcve.org/view.php?id=CVE-2002-2261
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname. • ftp://patches.sgi.com/support/free/security/advisories/20030101-01-P http://secunia.com/advisories/7826 http://securitytracker.com/id?1005748 http://www.securityfocus.com/bid/6548 http://www.sendmail.org/8.12.7.html http://www.vupen.com/english/advisories/2009/3539 https://exchange.xforce.ibmcloud.com/vulnerabilities/10775 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6892 https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.ov • CWE-264: Permissions, Privileges, and Access Controls •
CVE-2002-0906
https://notcve.org/view.php?id=CVE-2002-0906
Buffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server. Desbordamiento de búfer en Sendmail anteriores a 8.12.5, cuando se configura para usar un mapa de DNS modificado para consultar registros TXT, permite a atacantes remotos causar una denegación de servicio y posiblemente ejecutar código arbitrario mediante un servidor DNS malicioso. • http://www.iss.net/security_center/static/9443.php http://www.kb.cert.org/vuls/id/814627 http://www.securityfocus.com/bid/5122 http://www.sendmail.org/8.12.5.html https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2183 •
CVE-2002-1165 – Sendmail 8.12.x - SMRSH Double Pipe Access Validation
https://notcve.org/view.php?id=CVE-2002-1165
Sendmail Consortium's Restricted Shell (SMRSH) in Sendmail 8.12.6, 8.11.6-15, and possibly other versions after 8.11 from 5/19/1998, allows attackers to bypass the intended restrictions of smrsh by inserting additional commands after (1) "||" sequences or (2) "/" characters, which are not properly filtered or verified. Sendmail Consortium's Restricted Shell (SMRSH) en Sendmail 8.12.6, 8.11.6-15 y anteriores, permite a atacantes puentear las restricciones pretendidas de smrsh insertando caractéres adicionales después de secuencias "||" (dos barras verticales) o "/" (barra), que no son adecuadamente filtradas o verificadas. • https://www.exploit-db.com/exploits/21884 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2002-023.txt.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000532 http://marc.info/?l=bugtraq&m=103350914307274&w=2 http://secunia.com/advisories/7826 http://www.iss.net/security_center/static/10232.php http://www.mandriva.com/security/advisories?name=MDKSA-2002:083 http://www.redhat.com/support/errata/RHSA-2003-073.html http://www.securityfocus.com/bi •
CVE-2001-0714
https://notcve.org/view.php?id=CVE-2001-0714
Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to cause a denial of service (data loss) by (1) setting a high initial message hop count option (-h), which causes Sendmail to drop queue entries, (2) via the -qR option, or (3) via the -qS option. • ftp://patches.sgi.com/support/free/security/advisories/20011101-01-I http://razor.bindview.com/publish/advisories/adv_sm812.html •
CVE-2001-0713
https://notcve.org/view.php?id=CVE-2001-0713
Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the configuration file whose names contain characters with the high bit set, such as (1) macro names that are one character long, (2) a variable setting which is processed by the setoption function, or (3) a Modifiers setting which is processed by the getmodifiers function. • http://razor.bindview.com/publish/advisories/adv_sm812.html http://www.iss.net/security_center/static/7192.php http://www.securityfocus.com/bid/3377 •