Vulnerability Name: | CVE-2001-1349 (CCN-6633) | ||||||||
Assigned: | 2001-05-28 | ||||||||
Published: | 2001-05-28 | ||||||||
Updated: | 2008-09-05 | ||||||||
Summary: | Sendmail before 8.11.4, and 8.12.0 before 8.12.0.Beta10, allows local users to cause a denial of service and possibly corrupt the heap and gain privileges via race conditions in signal handlers. | ||||||||
CVSS v3 Severity: | 4.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:L)
| ||||||||
CVSS v2 Severity: | 3.7 Low (CVSS v2 Vector: AV:L/AC:H/Au:N/C:P/I:P/A:P)
| ||||||||
Vulnerability Type: | CWE-Other | ||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||
References: | Source: CCN Type: BugTraq Mailing List, Tue May 29 2001 00:10:03 sendmail 8.11.4 and 8.12.0.Beta10 available (fwd) Source: CONFIRM Type: UNKNOWN http://archives.neohapsis.com/archives/sendmail/2001-q2/0001.html Source: MITRE Type: CNA CVE-2001-1349 Source: BINDVIEW Type: Exploit, Patch, Vendor Advisory 20010528 Unsafe Signal Handling in Sendmail Source: CCN Type: BindView RAZOR Security Advisory, May 28, 2001 Unsafe Signal Handling in Sendmail Source: CCN Type: RHSA-2001-106 New sendmail packages available which fix a local root exploit Source: REDHAT Type: UNKNOWN RHSA-2001:106 Source: XF Type: UNKNOWN sendmail-signal-handling(6633) Source: CCN Type: OpenBSD 3.9 errata 001: SECURITY FIX: March 25, 2006 Source: CCN Type: OSVDB ID: 5429 Sendmail Insecure Signal Handling Local DoS Source: BUGTRAQ Type: Vendor Advisory 20010529 sendmail 8.11.4 and 8.12.0.Beta10 available (fwd) Source: BID Type: Patch, Vendor Advisory 2794 Source: CCN Type: BID-2794 Sendmail Unsafe Signal Handling Race Condition Vulnerability Source: XF Type: UNKNOWN sendmail-signal-handling(6633) | ||||||||
Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
BACK |