Vulnerability Name:

CVE-2001-1349 (CCN-6633)

Assigned:2001-05-28
Published:2001-05-28
Updated:2008-09-05
Summary:Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers.
CVSS v3 Severity:4.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): Low
Integrity (I): Low
Availibility (A): Low
CVSS v2 Severity:3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
3.7 Low (CCN CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): Partial
Availibility (A): Partial
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Privileges
References:Source: CCN
Type: BugTraq Mailing List, Tue May 29 2001 00:10:03
sendmail 8.11.4 and 8.12.0.Beta10 available (fwd)

Source: CONFIRM
Type: UNKNOWN
http://archives.neohapsis.com/archives/sendmail/2001-q2/0001.html

Source: MITRE
Type: CNA
CVE-2001-1349

Source: BINDVIEW
Type: Exploit, Patch, Vendor Advisory
20010528 Unsafe Signal Handling in Sendmail

Source: CCN
Type: BindView RAZOR Security Advisory, May 28, 2001
Unsafe Signal Handling in Sendmail

Source: CCN
Type: RHSA-2001-106
New sendmail packages available which fix a local root exploit

Source: REDHAT
Type: UNKNOWN
RHSA-2001:106

Source: XF
Type: UNKNOWN
sendmail-signal-handling(6633)

Source: CCN
Type: OpenBSD 3.9 errata
001: SECURITY FIX: March 25, 2006

Source: CCN
Type: OSVDB ID: 5429
Sendmail Insecure Signal Handling Local DoS

Source: BUGTRAQ
Type: Vendor Advisory
20010529 sendmail 8.11.4 and 8.12.0.Beta10 available (fwd)

Source: BID
Type: Patch, Vendor Advisory
2794

Source: CCN
Type: BID-2794
Sendmail Unsafe Signal Handling Race Condition Vulnerability

Source: XF
Type: UNKNOWN
sendmail-signal-handling(6633)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:openbsd:openbsd:3.9:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    BACK
    sendmail sendmail 8.10
    sendmail sendmail 8.10.1
    sendmail sendmail 8.10.2
    sendmail sendmail 8.11.0
    sendmail sendmail 8.11.1
    sendmail sendmail 8.11.2
    sendmail sendmail 8.11.3
    sendmail sendmail 8.12 beta7
    sendmail sendmail 8.11.1
    sendmail sendmail 8.12 beta7
    sendmail sendmail 8.12 beta5
    sendmail sendmail 8.11.3
    sendmail sendmail 8.11.2
    sendmail sendmail 8.10.2
    sendmail sendmail 8.10.1
    sendmail sendmail 8.10
    redhat linux 6.2
    redhat linux 7
    redhat linux 7.1
    openbsd openbsd 3.9