This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Sendmail First view 2003-05-15
Product Sendmail Last view 2014-06-04
Version 8.12.9 Type Application
Update *  
Edition *  
Language *  
Sofware Edition *  
Target Software *  
Target Hardware *  
Other *  
 
CPE Product cpe:2.3:a:sendmail:sendmail

Activity : Overall

Related : CVE

  Date Alert Description
1.9 2014-06-04 CVE-2014-3956

The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.

7.5 2010-01-04 CVE-2009-4565

sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408.

5 2009-05-05 CVE-2009-1490

Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header.

5 2006-08-28 CVE-2006-4434

Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."

5 2006-06-07 CVE-2006-1173

Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.

5 2005-06-29 CVE-2005-2070

The ClamAV Mail fILTER (clamav-milter) 0.84 through 0.85d, when used in Sendmail using long timeouts, allows remote attackers to cause a denial of service by keeping an open connection, which prevents ClamAV from reloading.

10 2003-10-06 CVE-2003-0694

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.

7.5 2003-10-06 CVE-2003-0681

A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.

7.2 2003-05-15 CVE-2003-0308

The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl.

CWE : Common Weakness Enumeration

%idName
40% (2) CWE-399 Resource Management Errors
20% (1) CWE-310 Cryptographic Issues
20% (1) CWE-200 Information Exposure
20% (1) CWE-119 Failure to Constrain Operations within the Bounds of a Memory Buffer

CAPEC : Common Attack Pattern Enumeration & Classification

id Name
CAPEC-2 Inducing Account Lockout
CAPEC-82 Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Servi...
CAPEC-147 XML Ping of Death
CAPEC-228 Resource Depletion through DTD Injection in a SOAP Message

Open Source Vulnerability Database (OSVDB)

id Description
62373 Sendmail X.509 Certificate Null Character MiTM Spoofing Weakness
54669 Sendmail Mail X-Header Handling Remote Overflow
28193 Sendmail Header Processing Overflow DoS
26197 Sendmail Multi-Part MIME Message Handling DoS
17562 ClamAV clamav-milter Remote Connection Hold DoS
9308 Debian Sendmail doublebounce.pl Script Insecure Temp File Privilege Escalation
9307 Debian Sendmail checksendmail Script Insecure Temp File Privilege Escalation
9306 Debian Sendmail expn Script Insecure Temp File Privilege Escalation
2577 Sendmail prescan() Function Remote Overflow

OpenVAS Exploits

id Description
2012-08-10 Name : Gentoo Security Advisory GLSA 201206-30 (sendmail)
File : nvt/glsa_201206_30.nasl
2011-02-18 Name : RedHat Update for sendmail RHSA-2011:0262-01
File : nvt/gb_RHSA-2011_0262-01_sendmail.nasl
2010-06-25 Name : Fedora Update for sendmail FEDORA-2010-5470
File : nvt/gb_fedora_2010_5470_sendmail_fc12.nasl
2010-06-18 Name : Fedora Update for sendmail FEDORA-2010-5399
File : nvt/gb_fedora_2010_5399_sendmail_fc11.nasl
2010-04-06 Name : RedHat Update for sendmail RHSA-2010:0237-05
File : nvt/gb_RHSA-2010_0237-05_sendmail.nasl
2010-03-31 Name : HP-UX Update for sendmail with STARTTLS Enabled HPSBUX02508
File : nvt/gb_hp_ux_HPSBUX02508.nasl
2010-01-19 Name : Mandriva Update for sendmail MDVSA-2010:003 (sendmail)
File : nvt/gb_mandriva_MDVSA_2010_003.nasl
2010-01-04 Name : Sendmail NULL Character CA SSL Certificate Validation Security Bypass Vulnera...
File : nvt/sendmail_37543.nasl
2009-10-10 Name : SLES9: Security update for sendmail
File : nvt/sles9p5014809.nasl
2009-05-13 Name : Sendmail Buffer Overflow Vulnerability
File : nvt/gb_sendmail_bof_vuln.nasl
2009-05-05 Name : HP-UX Update for sendmail HPSBUX00281
File : nvt/gb_hp_ux_HPSBUX00281.nasl
2008-09-24 Name : Gentoo Security Advisory GLSA 200606-19 (sendmail)
File : nvt/glsa_200606_19.nasl
2008-09-04 Name : FreeBSD Security Advisory (FreeBSD-SA-06:17.sendmail.asc)
File : nvt/freebsdsa_sendmail2.nasl
2008-01-17 Name : Debian Security Advisory DSA 737-1 (clamav)
File : nvt/deb_737_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 384-1 (sendmail)
File : nvt/deb_384_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 305-1 (sendmail)
File : nvt/deb_305_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1164-1 (sendmail)
File : nvt/deb_1164_1.nasl
2008-01-17 Name : Debian Security Advisory DSA 1155-2 (sendmail)
File : nvt/deb_1155_2.nasl
2008-01-17 Name : Debian Security Advisory DSA 1155-1 (sendmail)
File : nvt/deb_1155_1.nasl
0000-00-00 Name : Slackware Advisory SSA:2006-166-01 sendmail
File : nvt/esoft_slk_ssa_2006_166_01.nasl

Information Assurance Vulnerability Management (IAVM)

id Description
2010-A-0002 Sendmail SSL Certificate Validation Vulnerability
Severity: Category I - VMSKEY: V0022182

Snort® IPS/IDS

Date Description
2014-01-10 RCPT TO overflow
RuleID : 654-community - Type : SERVER-MAIL - Revision : 28
2014-01-10 RCPT TO overflow
RuleID : 654 - Type : SERVER-MAIL - Revision : 28
2014-01-10 Sendmail RCPT TO prescan too long addresses overflow
RuleID : 2270-community - Type : SERVER-MAIL - Revision : 18
2014-01-10 Sendmail RCPT TO prescan too long addresses overflow
RuleID : 2270 - Type : SERVER-MAIL - Revision : 18
2014-01-10 RCPT TO overflow
RuleID : 18574 - Type : SERVER-MAIL - Revision : 6

Nessus® Vulnerability Scanner

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
id Description
2018-04-10 Name: The remote AIX host is missing a security patch.
File: aix_IJ03273.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote AIX host is missing a security patch.
File: aix_IJ03121.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote AIX host is missing a security patch.
File: aix_IJ02920.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote AIX host is missing a security patch.
File: aix_IJ02919.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote AIX host is missing a security patch.
File: aix_IJ02918.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote AIX host is missing a security patch.
File: aix_IJ02917.nasl - Type: ACT_GATHER_INFO
2018-04-10 Name: The remote AIX host is missing a security patch.
File: aix_IJ02915.nasl - Type: ACT_GATHER_INFO
2015-03-30 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2015-128.nasl - Type: ACT_GATHER_INFO
2015-01-19 Name: The remote Solaris system is missing a security patch for third-party software.
File: solaris11_sendmail_20141120.nasl - Type: ACT_GATHER_INFO
2014-12-23 Name: The remote Gentoo host is missing one or more security-related patches.
File: gentoo_GLSA-201412-32.nasl - Type: ACT_GATHER_INFO
2014-08-01 Name: The remote Mandriva Linux host is missing one or more security updates.
File: mandriva_MDVSA-2014-147.nasl - Type: ACT_GATHER_INFO
2014-07-05 Name: The remote SuSE 11 host is missing a security update.
File: suse_11_rmail-140604.nasl - Type: ACT_GATHER_INFO
2014-06-20 Name: The remote Fedora host is missing a security update.
File: fedora_2014-7095.nasl - Type: ACT_GATHER_INFO
2014-06-18 Name: The remote openSUSE host is missing a security update.
File: openSUSE-2014-425.nasl - Type: ACT_GATHER_INFO
2014-06-13 Name: The remote Fedora host is missing a security update.
File: fedora_2014-7093.nasl - Type: ACT_GATHER_INFO
2014-06-06 Name: The remote Slackware host is missing a security update.
File: Slackware_SSA_2014-156-04.nasl - Type: ACT_GATHER_INFO
2014-06-03 Name: The remote mail server is affected by an SMTP connection manipulation vulnera...
File: sendmail_8_14_9.nasl - Type: ACT_GATHER_INFO
2013-07-12 Name: The remote Oracle Linux host is missing one or more security updates.
File: oraclelinux_ELSA-2011-0262.nasl - Type: ACT_GATHER_INFO
2013-03-13 Name: The remote AIX host is missing a vendor-supplied security patch.
File: aix_U477911.nasl - Type: ACT_GATHER_INFO
2013-03-13 Name: The remote AIX host is missing a vendor-supplied security patch.
File: aix_U497412.nasl - Type: ACT_GATHER_INFO
2013-01-24 Name: The remote AIX host is missing a security patch.
File: aix_IZ72837.nasl - Type: ACT_GATHER_INFO
2013-01-24 Name: The remote AIX host is missing a security patch.
File: aix_IZ70637.nasl - Type: ACT_GATHER_INFO
2013-01-24 Name: The remote AIX host is missing a security patch.
File: aix_IZ72836.nasl - Type: ACT_GATHER_INFO
2013-01-24 Name: The remote AIX host is missing a security patch.
File: aix_IZ72835.nasl - Type: ACT_GATHER_INFO
2013-01-24 Name: The remote AIX host is missing a security patch.
File: aix_IZ72834.nasl - Type: ACT_GATHER_INFO