This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Summuary
CPE Namecpe:/a:sendmail:sendmail_switch:3.0
Detail
VendorSendmailFirst view 2003-03-07
ProductSendmail SwitchLast view2003-10-06
Version3.0TypeApplication
Edition 
Language 
Update 
 
CPE Productcpe:/a:sendmail:sendmail_switch

Activity : Overall

Related : CVE

 DateAlertAccess VectorAccess ComplexityAuthentication
102003-10-06CVE-2003-0694NetworkLowNone Requ...
7.52003-10-06CVE-2003-0681NetworkLowNone Requ...
102003-04-02CVE-2003-0161NetworkLowNone Requ...
102003-03-07CVE-2002-1337NetworkLowNone Requ...

CAPEC : Common Attack Pattern Enumeration & Classification

idName
CAPEC-8Buffer Overflow in an API Call
CAPEC-9Buffer Overflow in Local Command-Line Utilities
CAPEC-10Buffer Overflow via Environment Variables
CAPEC-14Client-side Injection-induced Buffer Overflow
CAPEC-24Filter Failure through Buffer Overflow
Hide | Show 9 More...
idName
CAPEC-42MIME Conversion
CAPEC-44Overflow Binary Resource File
CAPEC-45Buffer Overflow via Symbolic Links
CAPEC-46Overflow Variables and Tags
CAPEC-47Buffer Overflow via Parameter Expansion
CAPEC-67String Format Overflow in syslog()
CAPEC-92Forced Integer Overflow
CAPEC-100Overflow Buffers
CAPEC-123Buffer Attacks

Oval Markup Language : Definitions

OvalIDName
oval:org.mitre.oval:def:603Sendmail BO in prescan Function
oval:org.mitre.oval:def:572Sendmail BO in Prescan Function
oval:org.mitre.oval:def:2975Sendmail prescan function Buffer Overflow
oval:org.mitre.oval:def:2222Sendmail Address Processor Buffer Overflow
oval:org.mitre.oval:def:595Potential BO in Ruleset Parsing for Sendmail
Hide | Show 1 More...
idName
oval:org.mitre.oval:def:3606Sendmail Ruleset Parsing Buffer Overflow

Open Source Vulnerability Database (OSVDB)

idDescription
8294Sendmail NOCHAR Control Value prescan Overflow
4502Sendmail headers.c crackaddr Function Address Field Handling Remote Overflow
2577Sendmail prescan() Function Remote Overflow

OpenVAS Exploits

idDescription
2009-05-05Name : HP-UX Update for sendmail HPSBUX00246
File : nvt/gb_hp_ux_HPSBUX00246.nasl
2009-05-05Name : HP-UX Update for sendmail HPSBUX00281
File : nvt/gb_hp_ux_HPSBUX00281.nasl
2008-01-17Name : Debian Security Advisory DSA 257-1 (sendmail)
File : nvt/deb_257_1.nasl
2008-01-17Name : Debian Security Advisory DSA 278-1 (sendmail)
File : nvt/deb_278_1.nasl
2008-01-17Name : Debian Security Advisory DSA 278-2 (sendmail)
File : nvt/deb_278_2.nasl
Hide | Show 4 More...
idDescription
2008-01-17Name : Debian Security Advisory DSA 290-1 (sendmail-wide)
File : nvt/deb_290_1.nasl
2008-01-17Name : Debian Security Advisory DSA 384-1 (sendmail)
File : nvt/deb_384_1.nasl
2005-11-03Name : Sendmail remote header buffer overflow
File : nvt/sendmail_header.nasl
2005-11-03Name : Sendmail 8.8.8 to 8.12.7 Double Pipe Access Validation Vulnerability
File : nvt/SHN_Sendmail_DoublePipe.nasl

Snort® IPS/IDS

This CPE have more than 25 Relations. If you want to see a complete summary for this CPE, please contact us.
DateDescription
2014-01-10RCPT TO overflow
RuleID : 654-community - Type : SERVER-MAIL - Revision : 28
2014-01-10RCPT TO overflow
RuleID : 654 - Type : SERVER-MAIL - Revision : 28
2014-01-10Sendmail RCPT TO prescan too long addresses overflow
RuleID : 2270-community - Type : SERVER-MAIL - Revision : 18
2014-01-10Sendmail RCPT TO prescan too long addresses overflow
RuleID : 2270 - Type : SERVER-MAIL - Revision : 18
2014-01-10Sendmail RCPT TO prescan too many addresses overflow
RuleID : 2269-community - Type : SERVER-MAIL - Revision : 15
Hide | Show 20 More...
DateDescription
2014-01-10Sendmail RCPT TO prescan too many addresses overflow
RuleID : 2269 - Type : SERVER-MAIL - Revision : 15
2014-01-10Sendmail MAIL FROM prescan too long addresses overflow
RuleID : 2268-community - Type : SERVER-MAIL - Revision : 16
2014-01-10Sendmail MAIL FROM prescan too long addresses overflow
RuleID : 2268 - Type : SERVER-MAIL - Revision : 16
2014-01-10Sendmail MAIL FROM prescan too many addresses overflow
RuleID : 2267-community - Type : SERVER-MAIL - Revision : 15
2014-01-10Sendmail MAIL FROM prescan too many addresses overflow
RuleID : 2267 - Type : SERVER-MAIL - Revision : 15
2014-01-10Sendmail SOML FROM prescan too long addresses overflow
RuleID : 2266-community - Type : SERVER-MAIL - Revision : 16
2014-01-10Sendmail SOML FROM prescan too long addresses overflow
RuleID : 2266 - Type : SERVER-MAIL - Revision : 16
2014-01-10Sendmail SOML FROM prescan too many addresses overflow
RuleID : 2265-community - Type : SERVER-MAIL - Revision : 14
2014-01-10Sendmail SOML FROM prescan too many addresses overflow
RuleID : 2265 - Type : SERVER-MAIL - Revision : 14
2014-01-10Sendmail SAML FROM prescan too long addresses overflow
RuleID : 2264-community - Type : SERVER-MAIL - Revision : 16
2014-01-10Sendmail SAML FROM prescan too long addresses overflow
RuleID : 2264 - Type : SERVER-MAIL - Revision : 16
2014-01-10Sendmail SAML FROM prescan too many addresses overflow
RuleID : 2263-community - Type : SERVER-MAIL - Revision : 16
2014-01-10Sendmail SAML FROM prescan too many addresses overflow
RuleID : 2263 - Type : SERVER-MAIL - Revision : 16
2014-01-10Sendmail SEND FROM prescan too long addresses overflow
RuleID : 2262-community - Type : SERVER-MAIL - Revision : 16
2014-01-10Sendmail SEND FROM prescan too long addresses overflow
RuleID : 2262 - Type : SERVER-MAIL - Revision : 16
2014-01-10Sendmail SEND FROM prescan too many addresses overflow
RuleID : 2261-community - Type : SERVER-MAIL - Revision : 16
2014-01-10Sendmail SEND FROM prescan too many addresses overflow
RuleID : 2261 - Type : SERVER-MAIL - Revision : 16
2014-01-10VRFY overflow attempt
RuleID : 2260-community - Type : SERVER-MAIL - Revision : 17
2014-01-10VRFY overflow attempt
RuleID : 2260 - Type : SERVER-MAIL - Revision : 17
2014-01-10EXPN overflow attempt
RuleID : 2259-community - Type : SERVER-MAIL - Revision : 17

Nessus® Vulnerability Scanner

idDescription
2007-09-25Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_35483.nasl - Type : ACT_GATHER_INFO
2007-09-25Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_35484.nasl - Type : ACT_GATHER_INFO
2007-09-25Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_35485.nasl - Type : ACT_GATHER_INFO
2005-02-16Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_28409.nasl - Type : ACT_GATHER_INFO
2005-02-16Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_29526.nasl - Type : ACT_GATHER_INFO
Hide | Show 20 More...
idDescription
2005-02-16Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_29912.nasl - Type : ACT_GATHER_INFO
2005-02-16Name : The remote HP-UX host is missing a security-related patch.
File : hpux_PHNE_30224.nasl - Type : ACT_GATHER_INFO
2004-09-29Name : The remote Debian host is missing a security-related update.
File : debian_DSA-290.nasl - Type : ACT_GATHER_INFO
2004-09-29Name : The remote Debian host is missing a security-related update.
File : debian_DSA-384.nasl - Type : ACT_GATHER_INFO
2004-09-29Name : The remote Debian host is missing a security-related update.
File : debian_DSA-278.nasl - Type : ACT_GATHER_INFO
2004-09-29Name : The remote Debian host is missing a security-related update.
File : debian_DSA-257.nasl - Type : ACT_GATHER_INFO
2004-09-01Name : The remote host is missing a vendor-supplied security patch
File : aix_IY40501.nasl - Type : ACT_GATHER_INFO
2004-09-01Name : The remote host is missing a vendor-supplied security patch
File : aix_IY48657.nasl - Type : ACT_GATHER_INFO
2004-09-01Name : The remote host is missing a vendor-supplied security patch
File : aix_IY48658.nasl - Type : ACT_GATHER_INFO
2004-07-31Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2003-092.nasl - Type : ACT_GATHER_INFO
2004-07-31Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2003-028.nasl - Type : ACT_GATHER_INFO
2004-07-31Name : The remote Mandrake Linux host is missing one or more security updates.
File : mandrake_MDKSA-2003-042.nasl - Type : ACT_GATHER_INFO
2004-07-25Name : The remote host is missing a vendor-supplied security patch
File : suse_SA_2003_040.nasl - Type : ACT_GATHER_INFO
2004-07-06Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2003-284.nasl - Type : ACT_GATHER_INFO
2004-07-06Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2003-074.nasl - Type : ACT_GATHER_INFO
2004-07-06Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2003-121.nasl - Type : ACT_GATHER_INFO
2003-09-17Name : The remote mail server is prone to multiple buffer overflow attacks.
File : sendmail_prescan_overflow.nasl - Type : ACT_GATHER_INFO
2003-03-29Name : Arbitrary code may be run on the remote server
File : sendmail_conversion_overflow.nasl - Type : ACT_GATHER_INFO
2003-03-05Name : The remote host has an application that is affected by multiple vulnerabilities.
File : SHN_Sendmail_DoublePipe.nasl - Type : ACT_GATHER_INFO
2003-03-03Name : The remote host has an application that is affected by a buffer overflow vuln...
File : sendmail_header.nasl - Type : ACT_GATHER_INFO