First published: Wed Sep 03 2003(Updated: )
The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Redhat Sendmail | =8.12.8-4 | |
Redhat Sendmail | =8.12.5-7 | |
Sendmail Sendmail | =8.12.3 | |
Sendmail Sendmail | =8.12.8 | |
SGI IRIX | =6.5.21 | |
SGI IRIX | =6.5.19 | |
Sendmail Sendmail | =8.12.4 | |
SGI IRIX | =6.5.20 | |
Sendmail Sendmail | =8.12.1 | |
Redhat Sendmail | =8.12.8-4 | |
Redhat Sendmail | =8.12.8-4 | |
Redhat Sendmail | =8.12.5-7 | |
Redhat Sendmail | =8.12.5-7 | |
Sendmail Sendmail | =8.12.5 | |
Redhat Sendmail | =8.12.5-7 | |
Sendmail Sendmail | =8.12.2 | |
Redhat Sendmail | =8.12.8-4 | |
Sendmail Sendmail | =8.12.6 | |
Sendmail Sendmail | =8.12.7 | |
FreeBSD FreeBSD | =4.7 | |
Compaq Tru64 | =5.0a | |
Openbsd Openbsd | =3.2 | |
FreeBSD FreeBSD | =4.8 | |
FreeBSD FreeBSD | =4.6 | |
Compaq Tru64 | =5.1 | |
FreeBSD FreeBSD | =5.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.