First published: Fri Oct 12 2001(Updated: )
Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the configuration file whose names contain characters with the high bit set, such as (1) macro names that are one character long, (2) a variable setting which is processed by the setoption function, or (3) a Modifiers setting which is processed by the getmodifiers function.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sendmail | <=8.12.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2001-0713 is considered a high-severity vulnerability due to its potential to allow local users to gain elevated privileges.
To fix CVE-2001-0713, upgrade Sendmail to version 8.12.1 or later, where this vulnerability is addressed.
CVE-2001-0713 affects all Sendmail versions prior to 8.12.1.
The potential consequences of CVE-2001-0713 include unauthorized privilege escalation by local users.
CVE-2001-0713 is a local privilege escalation vulnerability, meaning it cannot be exploited remotely.