First published: Tue Apr 01 2003(Updated: )
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sendmail | =2.1.2 | |
Sendmail | =3.0.2 | |
Sendmail | =2.2.2 | |
Sendmail Sendmail | =2.6.2 | |
Sendmail Sendmail | =8.9.2 | |
Sendmail | =2.1.1 | |
Sendmail Sendmail | =8.11.4 | |
Sendmail Sendmail | =8.12-beta16 | |
Sendmail Sendmail | =2.6 | |
Sendmail Sendmail | =8.10.1 | |
Sendmail Sendmail | =8.12.8 | |
Sendmail Sendmail | =8.9.1 | |
Sendmail | =2.2 | |
Sendmail | =2.2.1 | |
Sendmail Sendmail | =8.11.1 | |
Sendmail Sendmail | =8.11.3 | |
Sendmail Sendmail | =8.12.3 | |
Sendmail Sendmail | =8.12.4 | |
Sendmail | =2.1.3 | |
Sendmail Sendmail | =2.6.1 | |
Sendmail Sendmail | =8.10.2 | |
Sendmail Sendmail | =8.11.0 | |
Sendmail Sendmail | =8.12.1 | |
Sendmail Sendmail | =8.12-beta12 | |
Sendmail | =2.1 | |
Sendmail Sendmail | =3.0.3 | |
Sendmail Sendmail | =8.9.0 | |
Sendmail Sendmail | =8.10 | |
Sendmail Sendmail | =8.11.6 | |
Sendmail Sendmail | =8.12.0 | |
Sendmail Sendmail | =8.12.7 | |
Sendmail | =3.0.3 | |
Sendmail Sendmail | =3.0 | |
Sendmail Sendmail | =3.0.1 | |
Sendmail Sendmail | =8.11.2 | |
Sendmail Sendmail | =8.12-beta5 | |
Sendmail | =2.2.4 | |
Sendmail | =2.2.5 | |
Sendmail Sendmail | =8.12.2 | |
Sendmail Sendmail | =8.12-beta10 | |
Sendmail Sendmail | =8.9.3 | |
Sendmail | =2.2.3 | |
Sendmail Sendmail | =3.0.2 | |
Sendmail Sendmail | =8.11.5 | |
Sendmail Sendmail | =8.12.5 | |
Sendmail Sendmail | =8.12.6 | |
Sendmail Sendmail | =8.12-beta7 | |
Sendmail | =2.1.4 | |
Sendmail | =2.1.5 | |
Sendmail | =3.0 | |
Sendmail | =3.0.1 | |
HP-UX | =10.20 | |
HPE HP-UX | =10.30 | |
HP Tru64 UNIX | =5.0a_pk3_bl17 | |
HPE HP-UX | =11.11 | |
HP Tru64 UNIX | =5.1_pk3_bl17 | |
HPE HP-UX | =10.01 | |
Oracle Solaris SPARC | =2.4 | |
hp sis | ||
HPE HP-UX | =10.00 | |
HP Tru64 UNIX | =4.0g | |
HP Tru64 UNIX | =4.0d | |
HP Tru64 UNIX | =4.0d_pk9_bl17 | |
HP Tru64 UNIX | =5.0_pk4_bl18 | |
HPE HP-UX | =10.34 | |
HP Tru64 UNIX | =4.0g_pk3_bl17 | |
HP Tru64 UNIX | =5.0 | |
HP Tru64 UNIX | =5.0_pk4_bl17 | |
HP Tru64 UNIX | =5.1_pk4_bl18 | |
HP Tru64 UNIX | =5.1b_pk1_bl1 | |
HPE HP-UX | =10.26 | |
Oracle Solaris SPARC | =2.5.1 | |
Oracle Solaris SPARC | =2.5 | |
Oracle Solaris SPARC | =2.5.1 | |
HP Tru64 UNIX | =4.0f_pk6_bl17 | |
Sun SunOS | =5.5 | |
Sun SunOS | =5.7 | |
Sun SunOS | =5.8 | |
HP Tru64 UNIX | =4.0f_pk7_bl18 | |
HP Tru64 UNIX | =5.0a | |
HP Tru64 UNIX | =5.1_pk6_bl20 | |
HP Tru64 UNIX | =5.1a | |
HPE HP-UX | =10.08 | |
HP Tru64 UNIX | =4.0b | |
HP Tru64 UNIX | =5.1_pk5_bl19 | |
HP-UX | =10.20 | |
Oracle Solaris SPARC | =9.0 | |
Oracle Solaris SPARC | =9.0-x86_update_2 | |
HPE HP-UX | =11.0.4 | |
Sun SunOS | =5.4 | |
Oracle Solaris SPARC | =2.6 | |
Sun SunOS | ||
HP Tru64 UNIX | =5.1 | |
HP Tru64 UNIX | =5.1a_pk3_bl3 | |
HP Tru64 UNIX | =5.1b | |
HPE HP-UX | =10.16 | |
HPE HP-UX | =10.20 | |
HPE HP-UX | =10.24 | |
HPE HP-UX | =11.20 | |
HPE HP-UX | =11.22 | |
Sun SunOS | =5.5.1 | |
Oracle Solaris SPARC | =8.0 | |
Oracle Solaris SPARC | =9.0 | |
HP Tru64 UNIX | =4.0f | |
HP Tru64 UNIX | =5.0f | |
HP Tru64 UNIX | =5.1a_pk1_bl1 | |
HP Tru64 UNIX | =5.1a_pk2_bl2 | |
HPE HP-UX | =10.09 | |
HPE HP-UX | =10.10 | |
HPE HP-UX | =11.00 | |
Oracle Solaris SPARC | =7.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2003-0161 is considered high, as it allows remote attackers to exploit the vulnerability and potentially execute arbitrary code.
To fix CVE-2003-0161, update Sendmail to version 8.12.9 or later, which addresses the vulnerability.
CVE-2003-0161 affects multiple Sendmail versions, specifically those prior to 8.12.9.
Yes, CVE-2003-0161 can be exploited by attackers who send specially crafted email, leading to potential denial of service or code execution.
A temporary workaround for CVE-2003-0161 includes disabling unused Sendmail features or implementing strict input validation.