First published: Thu Sep 20 2001(Updated: )
Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sendmail | =8.11.0 | |
Sendmail | =8.11.1 | |
Sendmail | =8.11.2 | |
Sendmail | =8.11.3 | |
Sendmail | =8.11.4 | |
Sendmail | =8.11.5 | |
Sendmail | =8.12-beta10 | |
Sendmail | =8.12-beta12 | |
Sendmail | =8.12-beta16 | |
Sendmail | =8.12-beta5 | |
Sendmail | =8.12-beta7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0653 is considered a critical vulnerability due to the potential for privilege escalation.
To fix CVE-2001-0653, upgrade to a version of Sendmail that is not affected, specifically versions after 8.11.5.
CVE-2001-0653 affects local users of Sendmail versions 8.10.0 through 8.11.5 and 8.12.0 beta.
CVE-2001-0653 is a privilege escalation vulnerability.
No, CVE-2001-0653 can only be exploited by local users.