7.5
CVSSv2

CVE-2003-0681

Published: 06/10/2003 Updated: 03/05/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.

Vulnerable Product Search on Vulmon Subscribe to Product

sendmail sendmail switch 2.1.2

sendmail sendmail switch 3.0.2

sendmail sendmail switch 2.2.2

sendmail sendmail 2.6.2

sendmail sendmail 8.9.2

sendmail sendmail switch 2.1.1

sendmail sendmail 8.11.4

sendmail sendmail 8.8.8

sendmail sendmail 8.12

sendmail sendmail 2.6

sendmail sendmail 8.11.1

sendmail sendmail 8.11.0

sendmail sendmail switch 2.1.3

sendmail sendmail 8.12.3

sendmail sendmail 8.11.3

sendmail sendmail switch 2.2.1

sendmail sendmail 2.6.1

sendmail advanced message server 1.3

sendmail sendmail 8.12.8

sendmail sendmail 8.12.9

sendmail sendmail 8.9.1

sendmail sendmail pro 8.9.2

sendmail advanced message server 1.2

sendmail sendmail switch 2.2

sendmail sendmail 8.10.2

sendmail sendmail 8.12.4

sendmail sendmail 8.9.0

sendmail sendmail 3.0.3

sendmail sendmail 8.10.1

sendmail sendmail switch 2.1

sendmail sendmail 8.12.1

sendmail sendmail 8.11.6

sendmail sendmail 8.12.5

sendmail sendmail switch 2.2.3

sendmail sendmail switch 2.1.5

sendmail sendmail 8.10

sendmail sendmail switch 3.0

sendmail sendmail 8.9.3

sendmail sendmail switch 2.2.5

sendmail sendmail 8.12.0

sendmail sendmail 8.12.6

sendmail sendmail switch 3.0.1

sendmail sendmail 3.0.2

sendmail sendmail pro 8.9.3

sendmail sendmail 8.12.2

sendmail sendmail 3.0

sendmail sendmail 8.11.2

sendmail sendmail 3.0.1

sendmail sendmail 8.12.7

sendmail sendmail switch 2.2.4

sendmail sendmail switch 3.0.3

sendmail sendmail 8.11.5

sendmail sendmail switch 2.1.4

turbolinux turbolinux server 6.5

netbsd netbsd 1.5.3

netbsd netbsd 1.6

apple mac os x 10.2.5

hp hp-ux 11.11

apple mac os x server 10.2.2

apple mac os x server 10.2.4

netbsd netbsd 1.5

apple mac os x 10.2.1

turbolinux turbolinux workstation 6.0

openbsd openbsd 3.3

turbolinux turbolinux server 7.0

netbsd netbsd 1.6.1

apple mac os x server 10.2.3

apple mac os x 10.2.4

ibm aix 5.2

gentoo linux 1.4

apple mac os x 10.2.2

hp hp-ux 11.00

gentoo linux 0.5

turbolinux turbolinux workstation 7.0

netbsd netbsd 1.5.1

apple mac os x server 10.2.5

hp hp-ux 11.0.4

openbsd openbsd 3.2

hp hp-ux 11.22

ibm aix 4.3.3

gentoo linux 1.1a

netbsd netbsd 1.5.2

apple mac os x server 10.2.6

turbolinux turbolinux workstation 8.0

netbsd netbsd 1.4.3

apple mac os x server 10.2

apple mac os x server 10.2.1

gentoo linux 0.7

apple mac os x 10.2.6

gentoo linux 1.2

turbolinux turbolinux server 6.1

turbolinux turbolinux advanced server 6.0

turbolinux turbolinux server 8.0

apple mac os x 10.2.3

ibm aix 5.1

apple mac os x 10.2

Vendor Advisories

Two vulnerabilities were reported in sendmail CAN-2003-0681: A "potential buffer overflow in ruleset parsing" for Sendmail 8129, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences CAN-2003-0694: The prescan function in Sendmail 8129 allows remote at ...

Exploits

/* source: wwwsecurityfocuscom/bid/8641/info Sendmail is prone to a buffer overrun vulnerability in the prescan() function This issue is different than the vulnerability described in BID 7230 This vulnerability could permit remote attackers to execute arbitrary code via vulnerable versions of Sendmail */ /* Local exploit for the old ...