First published: Wed Sep 11 1996(Updated: )
Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sendmail | =8.7.1 | |
Sendmail | =8.7.5 | |
Sendmail | =8.7.4 | |
Sendmail | =8.7.2 | |
Sendmail | =8.6 | |
Sendmail | =8.7.3 | |
Xinuos OpenServer | =5.0 | |
HPE HP-UX | =10.01 | |
IBM AIX | =4.2 | |
Xinuos OpenServer | =5.0.2 | |
SCO Internet FastStart | =1.0 | |
BSDI BSD/OS | =2.1 | |
Red Hat Linux | =3.0.3 | |
OSF Digital | =1.3.2 | |
HPE HP-UX | =10.20 | |
IBM AIX | =4.1 | |
FreeBSD Kernel | =2.1.5 | |
IBM AIX | =3.2 | |
HPE HP-UX | =10.10 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-1999-0131 is rated as a high severity vulnerability due to the potential for root access by local users.
To fix CVE-1999-0131, you should upgrade to a version of Sendmail later than 8.7.5.
CVE-1999-0131 affects Sendmail versions 8.6 through 8.7.5 and various UNIX operating systems.
CVE-1999-0131 involves a buffer overflow attack that can lead to denial of service and unauthorized root access.
CVE-1999-0131 is primarily an issue for local users since it requires local access to exploit.