CVE-2001-0715
https://notcve.org/view.php?id=CVE-2001-0715
Sendmail before 8.12.1, without the RestrictQueueRun option enabled, allows local users to obtain potentially sensitive information about the mail queue by setting debugging flags to enable debug mode. • ftp://patches.sgi.com/support/free/security/advisories/20011101-01-I http://razor.bindview.com/publish/advisories/adv_sm812.html •
CVE-2001-0653 – Sendmail 8.11/8.12 Debugger - Arbitrary Code Execution
https://notcve.org/view.php?id=CVE-2001-0653
Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number. • https://www.exploit-db.com/exploits/21060 https://www.exploit-db.com/exploits/21061 https://www.exploit-db.com/exploits/21062 https://www.exploit-db.com/exploits/21063 ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2001-017.txt.asc http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000412 http://download.immunix.org/ImmunixOS/7.0/updates/IMNX-2001-70-032-01 http://marc.info/?l=bugtraq&m=99841063100516&w=2 http://rhn.redhat.com/errata/RHSA- •
CVE-2001-1349
https://notcve.org/view.php?id=CVE-2001-1349
Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers. • http://archives.neohapsis.com/archives/sendmail/2001-q2/0001.html http://razor.bindview.com/publish/advisories/adv_sm8120.html http://rhn.redhat.com/errata/RHSA-2001-106.html http://www.iss.net/security_center/static/6633.php http://www.securityfocus.com/archive/1/187127 http://www.securityfocus.com/bid/2794 •