First published: Thu May 15 2003(Updated: )
The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Sendmail | =8.12.3 | |
Sendmail | =8.12.9 | |
Sendmail | =8.9.3 | |
Debian Linux | =3.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2003-0308 is classified as a high-severity vulnerability due to the potential for local privilege escalation.
To fix CVE-2003-0308, users should upgrade to a patched version of Sendmail that securely creates temporary files.
CVE-2003-0308 affects Sendmail versions 8.12.3, 8.12.9, and 8.9.3 on Debian GNU/Linux 3.0.
CVE-2003-0308 cannot be exploited remotely, as it requires local access to the system.
The attack vectors for CVE-2003-0308 include using expn, checksendmail, or doublebounce.pl to gain additional privileges.