First published: Sat Nov 16 1996(Updated: )
Local users can start Sendmail in daemon mode and gain root privileges.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sendmail | =8.8.2 | |
Sendmail | =8.8.1 | |
Caldera Network Desktop | =1.0 | |
Sendmail | =8.8 | |
Sendmail | =8.7 | |
HPE HP-UX | =10.01 | |
HPE HP-UX | =10.00 | |
IBM AIX | =4.2 | |
BSDI BSD/OS | =2.1 | |
FreeBSD Kernel | =2.1.6 | |
Red Hat Linux | =4.0 | |
HPE HP-UX | =10.20 | |
FreeBSD Kernel | =2.1.5 | |
HPE HP-UX | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0130 is considered a high severity vulnerability due to its potential to allow local users to gain root privileges.
To mitigate CVE-1999-0130, users should upgrade to a patched version of Sendmail that resolves this exploit.
CVE-1999-0130 affects versions 8.7, 8.8, 8.8.1, and 8.8.2 of Sendmail.
CVE-1999-0130 requires local access to the system, making it a local privilege escalation vulnerability.
CVE-1999-0130 impacts multiple systems including Caldera Network Desktop, FreeBSD, HP-UX, and various Linux distributions.