Vulnerability Name: CVE-2001-0653 (CCN-7016) Assigned: 2001-08-17 Published: 2001-08-17 Updated: 2018-05-03 Summary: Sendmail 8.10.0 through 8.11.5, and 8.12.0 beta, allows local users to modify process memory and possibly gain privileges via a large value in the 'category' part of debugger (-d) command line arguments, which is interpreted as a negative number. CVSS v3 Severity: 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:L )Exploitability Metrics: Attack Vector (AV): LocalAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): LowIntegrity (I): LowAvailibility (A): Low
CVSS v2 Severity: 4.6 Medium (CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
4.6 Medium (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:P/I:P/A:P )Exploitability Metrics: Access Vector (AV): LocalAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): PartialIntegrity (I): PartialAvailibility (A): Partial
Vulnerability Type: CWE-Other Vulnerability Consequences: Gain Privileges References: Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-01:57sendmail contains local root vulnerability [REVISED] Source: NETBSD Type: UNKNOWNNetBSD-SA2001-017 Source: CCN Type: Caldera International, Inc. Security Advisory CSSA-2001-032.0Linux - sendmail instant root Source: CCN Type: Caldera International, Inc. Security Advisory CSSA-2001-SCO.31OpenServer: Sendmail debug input validation buffer overflow Source: CCN Type: BugTraq Mailing List, Wed Aug 22 2001 - 13:02:33 CDTsample exploitÂ….Re: *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd) Source: CCN Type: BugTraq Mailing List, Wed Aug 22 2001 - 19:40:02 CDTAnother sendmail exploit Source: CCN Type: BugTraq Mailing List, Thu Aug 23 2001 - 02:33:44 CDTRe: Another sendmail exploit [local root compromise] Source: CCN Type: SuSE Security Announcement SuSE-SA:2001:028sendmail Source: MITRE Type: CNACVE-2001-0653 Source: CONECTIVA Type: UNKNOWNCLA-2001:412 Source: CCN Type: Conectiva Linux Announcement CLSA-2001:412Sendmail local root vulnerability Source: CCN Type: Immunix OS Security Advisory IMNX-2001-70-032-01ImmunixOS 7.0 sendmail update Source: IMMUNIX Type: UNKNOWNIMNX-2001-70-032-01 Source: BUGTRAQ Type: UNKNOWN20010821 *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd) Source: CCN Type: RHSA-2001-106New sendmail packages available which fix a local root exploit Source: REDHAT Type: UNKNOWNRHSA-2001:106 Source: CALDERA Type: UNKNOWNCSSA-2001-032.0 Source: CCN Type: CIAC Information Bulletin L-133Sendmail Debugger Arbitrary Code Execution Vulnerability Source: CIAC Type: UNKNOWNL-133 Source: MANDRAKE Type: UNKNOWNMDKSA-2001:075 Source: SUSE Type: UNKNOWNSuSE-SA:2001:028 Source: CCN Type: OSVDB ID: 605Sendmail -d category Value Local Overflow Source: BID Type: Exploit, Patch, Vendor Advisory3163 Source: CCN Type: BID-3163Sendmail Debugger Arbitrary Code Execution Vulnerability Source: CCN Type: Sendmail Consortium Web siteSendmail 8.11.6 Source: CONFIRM Type: UNKNOWNhttp://www.sendmail.org/8.11.html Source: HP Type: UNKNOWNHPSBTL0112-007 Source: XF Type: UNKNOWNsendmail-debug-signed-int-overflow(7016) Source: XF Type: UNKNOWNsendmail-debug-signed-int-overflow(7016) Vulnerable Configuration: Configuration 1 :cpe:/a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:* AND cpe:/o:redhat:linux:5.2:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:6.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.0:*:*:*:*:*:*:* OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:* OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:* OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:* OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:* Denotes that component is vulnerable BACK
sendmail sendmail 8.11.0
sendmail sendmail 8.11.1
sendmail sendmail 8.11.2
sendmail sendmail 8.11.3
sendmail sendmail 8.11.4
sendmail sendmail 8.11.5
sendmail sendmail 8.12 beta10
sendmail sendmail 8.12 beta12
sendmail sendmail 8.12 beta16
sendmail sendmail 8.12 beta5
sendmail sendmail 8.12 beta7
sendmail sendmail 8.11.1
sendmail sendmail 8.12 beta7
sendmail sendmail 8.12 beta5
sendmail sendmail 8.12 beta16
sendmail sendmail 8.12 beta12
sendmail sendmail 8.12 beta10
sendmail sendmail 8.11.5
sendmail sendmail 8.11.4
sendmail sendmail 8.11.3
sendmail sendmail 8.11.2
redhat linux 5.2
redhat linux 6.0
redhat linux 6.2
freebsd freebsd 4.0
redhat linux 7
freebsd freebsd 4.1.1
mandrakesoft mandrake linux 7.2
suse suse linux 7.0
conectiva linux 6.0
freebsd freebsd 4.2
suse suse linux 7.1
redhat linux 7.1
mandrakesoft mandrake linux 8.0
suse suse linux 7.2
freebsd freebsd 4.3 -
conectiva linux 7.0
redhat linux 7.2
redhat linux 7.3