Vulnerability Name:

CVE-2001-0653 (CCN-7016)

Assigned:2001-08-17
Published:2001-08-17
Updated:2018-05-03
Summary:Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number.
CVSS v3 Severity:5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-01:57
sendmail contains local root vulnerability [REVISED]

Source: NETBSD
Type: UNKNOWN
NetBSD-SA2001-017

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2001-032.0
Linux - sendmail instant root

Source: CCN
Type: Caldera International, Inc. Security Advisory CSSA-2001-SCO.31
OpenServer: Sendmail debug input validation buffer overflow

Source: CCN
Type: BugTraq Mailing List, Wed Aug 22 2001 - 13:02:33 CDT
sample exploitÂ….Re: *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)

Source: CCN
Type: BugTraq Mailing List, Wed Aug 22 2001 - 19:40:02 CDT
Another sendmail exploit

Source: CCN
Type: BugTraq Mailing List, Thu Aug 23 2001 - 02:33:44 CDT
Re: Another sendmail exploit [local root compromise]

Source: CCN
Type: SuSE Security Announcement SuSE-SA:2001:028
sendmail

Source: MITRE
Type: CNA
CVE-2001-0653

Source: CONECTIVA
Type: UNKNOWN
CLA-2001:412

Source: CCN
Type: Conectiva Linux Announcement CLSA-2001:412
Sendmail local root vulnerability

Source: CCN
Type: Immunix OS Security Advisory IMNX-2001-70-032-01
ImmunixOS 7.0 sendmail update

Source: IMMUNIX
Type: UNKNOWN
IMNX-2001-70-032-01

Source: BUGTRAQ
Type: UNKNOWN
20010821 *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)

Source: CCN
Type: RHSA-2001-106
New sendmail packages available which fix a local root exploit

Source: REDHAT
Type: UNKNOWN
RHSA-2001:106

Source: CALDERA
Type: UNKNOWN
CSSA-2001-032.0

Source: CCN
Type: CIAC Information Bulletin L-133
Sendmail Debugger Arbitrary Code Execution Vulnerability

Source: CIAC
Type: UNKNOWN
L-133

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2001:075

Source: SUSE
Type: UNKNOWN
SuSE-SA:2001:028

Source: CCN
Type: OSVDB ID: 605
Sendmail -d category Value Local Overflow

Source: BID
Type: Exploit, Patch, Vendor Advisory
3163

Source: CCN
Type: BID-3163
Sendmail Debugger Arbitrary Code Execution Vulnerability

Source: CCN
Type: Sendmail Consortium Web site
Sendmail 8.11.6

Source: CONFIRM
Type: UNKNOWN
http://www.sendmail.org/8.11.html

Source: HP
Type: UNKNOWN
HPSBTL0112-007

Source: XF
Type: UNKNOWN
sendmail-debug-signed-int-overflow(7016)

Source: XF
Type: UNKNOWN
sendmail-debug-signed-int-overflow(7016)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sendmail sendmail 8.11.0
    sendmail sendmail 8.11.1
    sendmail sendmail 8.11.2
    sendmail sendmail 8.11.3
    sendmail sendmail 8.11.4
    sendmail sendmail 8.11.5
    sendmail sendmail 8.12 beta10
    sendmail sendmail 8.12 beta12
    sendmail sendmail 8.12 beta16
    sendmail sendmail 8.12 beta5
    sendmail sendmail 8.12 beta7
    sendmail sendmail 8.11.1
    sendmail sendmail 8.12 beta7
    sendmail sendmail 8.12 beta5
    sendmail sendmail 8.12 beta16
    sendmail sendmail 8.12 beta12
    sendmail sendmail 8.12 beta10
    sendmail sendmail 8.11.5
    sendmail sendmail 8.11.4
    sendmail sendmail 8.11.3
    sendmail sendmail 8.11.2
    redhat linux 5.2
    redhat linux 6.0
    redhat linux 6.2
    freebsd freebsd 4.0
    redhat linux 7
    freebsd freebsd 4.1.1
    mandrakesoft mandrake linux 7.2
    suse suse linux 7.0
    conectiva linux 6.0
    freebsd freebsd 4.2
    suse suse linux 7.1
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0
    suse suse linux 7.2
    freebsd freebsd 4.3 -
    conectiva linux 7.0
    redhat linux 7.2
    redhat linux 7.3