Executive Summary

Informations
NameCVE-2001-1349First vendor Publication2001-05-28
VendorCveLast vendor Modification2008-09-05

Security-Database Scoring CVSS v2

Cvss vector : (AV:L/AC:H/Au:N/C:P/I:P/A:P)
Cvss Base Score3.7Attack RangeLocal
Cvss Impact Score6.4Attack ComplexityHigh
Cvss Expoit Score1.9AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Security Protection

ImpactsProvides user account access : Allows partial confidentiality, integrity, and availability violation; Allows unauthorized disclosure of information; Allows disruption of service.

Detail

Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2001-1349

CWE : Common Weakness Enumeration

%idName

CPE : Common Platform Enumeration

TypeDescriptionCount
Application8

OpenVAS Exploits

DateDescription
2005-11-03Name : Sendmail remote header buffer overflow
File : nvt/sendmail_header.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
5429Sendmail Insecure Signal Handling Local DoS

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/2794
BINDVIEW http://razor.bindview.com/publish/advisories/adv_sm8120.html
BUGTRAQ http://www.securityfocus.com/archive/1/187127
CONFIRM http://archives.neohapsis.com/archives/sendmail/2001-q2/0001.html
REDHAT http://rhn.redhat.com/errata/RHSA-2001-106.html
XF http://www.iss.net/security_center/static/6633.php

Alert History

If you want to see full details history, please login or register.
0
DateInformations
2013-05-11 12:07:06
  • Multiple Updates