Executive Summary

Informations
NameCVE-2009-1490First vendor Publication2009-05-05
VendorCveLast vendor Modification2017-08-16

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2009-1490

CWE : Common Weakness Enumeration

%idName
100 %CWE-119Failure to Constrain Operations within the Bounds of a Memory Buffer

CPE : Common Platform Enumeration

TypeDescriptionCount
Application61

OpenVAS Exploits

DateDescription
2009-05-13Name : Sendmail Buffer Overflow Vulnerability
File : nvt/gb_sendmail_bof_vuln.nasl

Open Source Vulnerability Database (OSVDB)

idDescription
54669Sendmail Mail X-Header Handling Remote Overflow

Nessus® Vulnerability Scanner

DateDescription
2009-05-24Name : The remote mail server is affected by a buffer overflow vulnerability.
File : sendmail_x_header_buffer_overflow.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
CONFIRM http://www.sendmail.org/releases/8.13.2
MISC http://www.nmrc.org/~thegnome/blog/apr09/
XF https://exchange.xforce.ibmcloud.com/vulnerabilities/50355

Alert History

If you want to see full details history, please login or register.
0
1
2
3
DateInformations
2017-08-17 09:22:34
  • Multiple Updates
2016-04-26 18:47:41
  • Multiple Updates
2014-02-17 10:49:52
  • Multiple Updates
2013-05-10 23:49:42
  • Multiple Updates