Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:
Category:SMTP problems
Title:Sendmail buffer overflow due to type conversion

The remote sendmail server, according to its version number,
may be vulnerable to a remote buffer overflow allowing remote
users to gain root privileges.

Sendmail versions from 5.79 to 8.12.8 are vulnerable.
Solution : Upgrade to Sendmail ver 8.12.9 or greater or
if you cannot upgrade, apply patches for 8.10-12 here:

NOTE: manual patches do not change the version numbers.
Vendors who have released patched versions of sendmail
may still falsely show vulnerability.

*** OpenVAS reports this vulnerability using only
*** the banner of the remote SMTP server. Therefore,
*** this might be a false positive.

Risk factor : High

Cross-Ref: BugTraq ID: 7230
Common Vulnerability Exposure (CVE) ID: CVE-2003-0161
Bugtraq: 20030329 Sendmail: -1 gone wild (Google Search)
Bugtraq: 20030329 sendmail 8.12.9 available (Google Search)
Bugtraq: 20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail) (Google Search)
Bugtraq: 20030331 GLSA: sendmail (200303-27) (Google Search)
Bugtraq: 20030401 Immunix Secured OS 7+ openssl update (Google Search)
Bugtraq: 20030520 [Fwd: 127 Research and Development: 127 Day!] (Google Search)
Caldera Security Advisory: CSSA-2003-016.0
CERT/CC vulnerability note: VU#897604
Conectiva Linux advisory: CLA-2003:614
Debian Security Information: DSA-278 (Google Search)
Debian Security Information: DSA-290 (Google Search)
FreeBSD Security Advisory: FreeBSD-SA-03:07
HPdes Security Advisory: SSRT3531
Immunix Linux Advisory: IMNX-2003-7+-002-01
SCO Security Bulletin: SCOSA-2004.11
SGI Security Advisory: 20030401-01-P
SuSE Security Announcement: SuSE-SA:2003:023 (Google Search)
CopyrightThis script is Copyright (C) 2003 Renaud Deraison

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.

© 1998-2022 E-Soft Inc. All rights reserved.