First published: Tue Dec 31 2002(Updated: )
Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sendmail | =8.9.0 | |
Sendmail | =8.9.1 | |
Sendmail | =8.9.2 | |
Sendmail | =8.9.3 | |
Sendmail | =8.10 | |
Sendmail | =8.10.0 | |
Sendmail | =8.10.1 | |
Sendmail | =8.10.2 | |
Sendmail | =8.11.0 | |
Sendmail | =8.11.1 | |
Sendmail | =8.11.2 | |
Sendmail | =8.11.3 | |
Sendmail | =8.11.4 | |
Sendmail | =8.11.5 | |
Sendmail | =8.11.6 | |
Sendmail | =8.11.7 | |
Sendmail | =8.12-beta10 | |
Sendmail | =8.12-beta12 | |
Sendmail | =8.12-beta16 | |
Sendmail | =8.12-beta5 | |
Sendmail | =8.12-beta7 | |
Sendmail | =8.12.0 | |
Sendmail | =8.12.1 | |
Sendmail | =8.12.2 | |
Sendmail | =8.12.3 | |
Sendmail | =8.12.4 | |
Sendmail | =8.12.5 | |
Sendmail | =8.12.6 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2002-2261 is considered a medium severity vulnerability as it allows remote attackers to bypass relaying restrictions.
To fix CVE-2002-2261, upgrade to Sendmail version 8.12.7 or later, which addresses this vulnerability.
CVE-2002-2261 affects Sendmail versions 8.9.0 through 8.12.6.
CVE-2002-2261 allows attackers to spoof a blank DNS hostname to bypass email relaying restrictions.
Yes, CVE-2002-2261 is a known vulnerability that has been present in several versions of Sendmail, making it a concern for many users.