First published: Tue Dec 31 2002(Updated: )
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sendmail Sendmail | =8.9.2 | |
Sendmail Sendmail | =8.11.4 | |
Sendmail Sendmail | =8.11.7 | |
Sendmail Sendmail | =8.12-beta16 | |
Sendmail Sendmail | =8.11.1 | |
Sendmail Sendmail | =8.11.0 | |
Sendmail Sendmail | =8.12.3 | |
Sendmail Sendmail | =8.11.3 | |
Sendmail Sendmail | =8.9.1 | |
Sendmail Sendmail | =8.10.2 | |
Sendmail Sendmail | =8.12.4 | |
Sendmail Sendmail | =8.12-beta12 | |
Sendmail Sendmail | =8.9.0 | |
Sendmail Sendmail | =8.10.1 | |
Sendmail Sendmail | =8.12.1 | |
Sendmail Sendmail | =8.11.6 | |
Sendmail Sendmail | =8.12.5 | |
Sendmail Sendmail | =8.10 | |
Sendmail Sendmail | =8.12-beta7 | |
Sendmail Sendmail | =8.9.3 | |
Sendmail Sendmail | =8.12.0 | |
Sendmail Sendmail | =8.10.0 | |
Sendmail Sendmail | =8.12-beta5 | |
Sendmail Sendmail | =8.12.6 | |
Sendmail Sendmail | =8.12-beta10 | |
Sendmail Sendmail | =8.12.2 | |
Sendmail Sendmail | =8.11.2 | |
Sendmail Sendmail | =8.11.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.