| Vulnerability Name: | CVE-2002-0906 (CCN-9443) | ||||||||
| Assigned: | 2002-06-28 | ||||||||
| Published: | 2002-06-28 | ||||||||
| Updated: | 2017-10-10 | ||||||||
| Summary: | Buffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server. | ||||||||
| CVSS v3 Severity: | 10.0 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
| ||||||||
| CVSS v2 Severity: | 7.5 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P) 5.5 Medium (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P/E:U/RL:OF/RC:C)
7.4 High (CCN Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C/E:U/RL:OF/RC:C)
| ||||||||
| Vulnerability Type: | CWE-Other | ||||||||
| Vulnerability Consequences: | Gain Access | ||||||||
| References: | Source: MITRE Type: CNA CVE-2002-0906 Source: CCN Type: Sun Alert ID: 57696 Security Vulnerability When sendmail(1) Does Not Check Length of DNS Replies Source: CCN Type: CIAC Information Bulletin P-059 Sendmail(1) Security Vulnerability Source: XF Type: Patch, Vendor Advisory sendmail-dns-txt-bo(9443) Source: CCN Type: US-CERT VU#814627 Sendmail vulnerable to buffer overflow when DNS map is specified using TXT records Source: CERT-VN Type: US Government Resource VU#814627 Source: CCN Type: OSVDB ID: 5056 Sendmail Custom DNS Map TXT Query Overflow Source: BID Type: UNKNOWN 5122 Source: CCN Type: BID-5122 Sendmail DNS Map TXT Record Buffer Overflow Vulnerability Source: CCN Type: Sendmail Consortium Web site Sendmail 8.12.5 Source: CONFIRM Type: UNKNOWN http://www.sendmail.org/8.12.5.html Source: XF Type: UNKNOWN sendmail-dns-txt-bo(9443) Source: OVAL Type: UNKNOWN oval:org.mitre.oval:def:2183 | ||||||||
| Vulnerable Configuration: | Configuration 1: Configuration CCN 1: Denotes that component is vulnerable | ||||||||
| Oval Definitions | |||||||||
| |||||||||
| BACK | |||||||||