7.2
CVSSv2

CVE-1999-0130

Published: 16/11/1996 Updated: 09/09/2008
CVSS v2 Base Score: 7.2 | Impact Score: 10 | Exploitability Score: 3.9
VMScore: 725
Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C

Vulnerability Summary

Local users can start Sendmail in daemon mode and gain root privileges.

Vulnerable Product Search on Vulmon Subscribe to Product

eric allman sendmail 8.7

eric allman sendmail 8.8

eric allman sendmail 8.8.1

eric allman sendmail 8.8.2

caldera network desktop 1.0

bsdi bsd os 2.1

freebsd freebsd 2.1.6

hp hp-ux 10.01

hp hp-ux 10.10

hp hp-ux 10.20

ibm aix 4.2

freebsd freebsd 2.1.5

hp hp-ux 10.00

redhat linux 4.0

Exploits

BSD/OS 21,Caldera Network Desktop 10,Eric Allman Sendmail <= 882,FreeBSD 215/216,HP-UX <= 1020,AIX 42,RedHat 40 Sendmail Daemon Mode Vulnerability source: wwwsecurityfocuscom/bid/716/info Sendmail is often run in daemon mode so that it can "listen" for incoming mail connections on the standard SMTP networking port, usual ...