Vulnerability Name:

CVE-2002-1337 (CCN-10748)

Assigned:2003-03-03
Published:2003-03-03
Updated:2018-10-30
Summary:Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
CVSS v3 Severity:9.3 Critical (CCN CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:N/UI:N/S:C/C:H/I:H/A:H)
Exploitability Metrics:Attack Vector (AV): Local
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Changed
Impact Metrics:Confidentiality (C): High
Integrity (I): High
Availibility (A): High
CVSS v2 Severity:10.0 High (CVSS v2 Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Low
Authentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
7.2 High (CCN CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
Exploitability Metrics:Access Vector (AV): Local
Access Complexity (AC): Low
Athentication (Au): None
Impact Metrics:Confidentiality (C): Complete
Integrity (I): Complete
Availibility (A): Complete
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CCN
Type: FreeBSD Security Advisory FreeBSD-SA-03:04.sendmail
sendmail header parsing buffer overflow

Source: NETBSD
Type: UNKNOWN
NetBSD-SA2003-002

Source: CCN
Type: SCO Security Advisory CSSA-2003-010.0
Linux: remote buffer overflow in sendmail (CERT CA-2003-07)

Source: CALDERA
Type: UNKNOWN
CSSA-2003-SCO.6

Source: CCN
Type: SCO Security Advisory CSSA-2003-SCO.6
OpenServer 5.0.5 OpenServer 5.0.6 OpenServer 5.0.7 : remote buffer overflow in sendmail (CERT CA-2003-07)

Source: CALDERA
Type: UNKNOWN
CSSA-2003-SCO.5

Source: CCN
Type: SCO Security Advisory CSSA-2003-SCO.5
UnixWare 7.1.1 Open UNIX 8.0.0 UnixWare 7.1.3 : remote buffer overflow in sendmail (CERT CA-2003-07)

Source: CCN
Type: SGI Security Advisory 20030301-01-P
Mail Header Buffer Overflow In Sendmail

Source: SGI
Type: UNKNOWN
20030301-01-P

Source: CCN
Type: BugTraq Mailing List, Tue Mar 04 2003 - 11:42:01 CST
[LSD] Technical analysis of the remote sendmail vulnerability

Source: MITRE
Type: CNA
CVE-2002-1337

Source: CONECTIVA
Type: UNKNOWN
CLA-2003:571

Source: CCN
Type: Conectiva Linux Announcement CLSA-2003:571
sendmail -- Remote vulnerability

Source: CCN
Type: AppleCare Knowledge Base Document 120195
Mac OS X Server Update 10.2.4: Information and Download

Source: MANDRAKE
Type: UNKNOWN
MDKSA-2003:028

Source: BUGTRAQ
Type: UNKNOWN
20030303 sendmail 8.12.8 available

Source: BUGTRAQ
Type: UNKNOWN
20030304 [LSD] Technical analysis of the remote sendmail vulnerability

Source: BUGTRAQ
Type: UNKNOWN
20030303 Fwd: APPLE-SA-2003-03-03 sendmail

Source: BUGTRAQ
Type: UNKNOWN
20030304 GLSA: sendmail (200303-4)

Source: HP
Type: UNKNOWN
HPSBUX0302-246

Source: CCN
Type: BugTraq Mailing List, 2003-03-04 14:16:36
[LSD] Technical analysis of the remote sendmail vulnerability

Source: CCN
Type: RHSA-2003-073
Updated sendmail packages fix critical security issues

Source: CCN
Type: RHSA-2003-074
sendmail security update

Source: CCN
Type: RHSA-2003-227
Updated sendmail packages fix vulnerabilities

Source: CCN
Type: Sun Alert ID: 51181
sendmail(1M) Parses Headers Incorrectly in Certain Corner Cases

Source: CCN
Type: Sun Alert ID: 51400
Sun Linux and Cobalt Legacy Products are Vulnerable to a sendmail(1M) Buffer Overflow

Source: AIXAPAR
Type: UNKNOWN
IY40500

Source: AIXAPAR
Type: UNKNOWN
IY40501

Source: AIXAPAR
Type: UNKNOWN
IY40502

Source: CCN
Type: CERT Advisory CA-2003-07
Remote Buffer Overflow in Sendmail

Source: CERT
Type: Patch, Third Party Advisory, US Government Resource
CA-2003-07

Source: CCN
Type: CIAC Information Bulletin N-048
Sendmail MTA Vulnerability

Source: DEBIAN
Type: UNKNOWN
DSA-257

Source: DEBIAN
Type: DSA-257
sendmail -- remote exploit

Source: CCN
Type: Internet Security Systems Security Advisory, March 3, 2002
Remote Sendmail Header Processing Vulnerability

Source: ISS
Type: Patch, Vendor Advisory
20030303 Remote Sendmail Header Processing Vulnerability

Source: XF
Type: UNKNOWN
sendmail-header-processing-bo(10748)

Source: CCN
Type: US-CERT VU#398025
Remote Buffer Overflow in Sendmail

Source: CERT-VN
Type: US Government Resource
VU#398025

Source: CCN
Type: Gentoo Linux Security Announcement 200303-4
sendmail -- remote root exploit

Source: CCN
Type: NetBSD Security Advisory 2003-002
Malformed header Sendmail Vulnerability

Source: CCN
Type: OpenPKG-SA-2003.016
Sendmail

Source: REDHAT
Type: UNKNOWN
RHSA-2003:073

Source: REDHAT
Type: UNKNOWN
RHSA-2003:074

Source: REDHAT
Type: UNKNOWN
RHSA-2003:227

Source: BID
Type: Exploit, Patch, Vendor Advisory
6991

Source: CCN
Type: BID-6991
Sendmail Header Processing Buffer Overflow Vulnerability

Source: CCN
Type: Sendmail Web site
Sendmail 8.12.8

Source: CONFIRM
Type: Patch, Vendor Advisory
http://www.sendmail.org/8.12.8.html

Source: CCN
Type: TLSA-2003-13
Vulnerability in Sendmail mail header processing.

Source: XF
Type: UNKNOWN
sendmail-header-processing-bo(10748)

Source: OVAL
Type: UNKNOWN
oval:org.mitre.oval:def:2222

Source: SUSE
Type: SUSE-SA:2003:013
sendmail sendmail-tls: local privilege escalation

Vulnerable Configuration:Configuration 1:
  • cpe:/a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:2.6:*:nt:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:2.6.1:*:nt:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:3.0:*:nt:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:3.0.1:*:nt:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:3.0.2:*:nt:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:5.59:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:5.61:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:5.65:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:sgi:freeware:1.0:*:*:*:*:*:*:*

  • Configuration 2:
  • cpe:/o:gentoo:linux:1.4:rc1:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:1.4:rc2:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.10:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.6:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:7.0:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8.0:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9.0:*:sparc:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9.0:*:x86:*:*:*:*:*
  • OR cpe:/o:sun:sunos:-:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.7:*:*:*:*:*:*:*
  • OR cpe:/o:sun:sunos:5.8:*:*:*:*:*:*:*
  • OR cpe:/o:windriver:bsdos:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:windriver:bsdos:4.3.1:*:*:*:*:*:*:*
  • OR cpe:/o:windriver:bsdos:5.0:*:*:*:*:*:*:*
  • OR cpe:/o:windriver:platform_sa:1.0:*:*:*:*:*:*:*

  • Configuration 3:
  • cpe:/h:hp:alphaserver_sc:*:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/o:hp:hp-ux:10.20:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*
  • OR cpe:/a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
  • AND
  • cpe:/o:sun:solaris:2.6::sparc:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.00:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0f:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:4.3:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:8::sparc:*:*:*:*:*
  • OR cpe:/o:redhat:linux:6.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.0:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.04:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.2:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1.1:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.11:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:4.0g:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:6.0:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:1.0.1:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.1:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.3:-:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:7.0:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.0a:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.1:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.1a:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:2.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.4:-:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_firewall:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_database_server:*:*:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_connectivity_server:*:*:*:*:*:*:*:*
  • OR cpe:/h:sun:cobalt_raq_xtr:*:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:conectiva:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:7.3:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.5:-:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:9::sparc:*:*:*:*:*
  • OR cpe:/o:debian:debian_linux:3.0:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6:-:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:current:*:*:*:*:*:*:*
  • OR cpe:/o:gentoo:linux:*:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6.1:release_p10:*:*:*:*:*:*
  • OR cpe:/a:suse:suse_linux_office_server:*:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:linux:8.0:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.1:*:*:*:*:*:*:*
  • OR cpe:/o:hp:hp-ux:11.22:*:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:9.0:*:*:*:*:*:*:*
  • OR cpe:/o:suse:suse_linux:8.1:*:*:*:*:*:*:*
  • OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:*
  • OR cpe:/o:netbsd:netbsd:current:*:*:*:*:*:*:*
  • OR cpe:/a:openpkg:openpkg:1.2:*:*:*:*:*:*:*
  • OR cpe:/o:ibm:aix:5.2:*:*:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.7:-:*:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:2.1:*:*:*:*:*:*:*
  • OR cpe:/o:compaq:tru64:5.1b:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:*
  • OR cpe:/o:sgi:irix:6.5.19:*:*:*:*:*:*:*
  • OR cpe:/o:sun:solaris:7.0::sparc:*:*:*:*:*
  • OR cpe:/o:redhat:linux_advanced_workstation:2.1::itanium:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.0::ppc:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.1::ia64:*:*:*:*:*
  • OR cpe:/o:mandrakesoft:mandrake_linux:8.2::ppc:*:*:*:*:*
  • OR cpe:/o:freebsd:freebsd:4.6.2:-:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20021337
    V
    CVE-2002-1337
    2015-11-16
    oval:org.mitre.oval:def:2222
    V
    Sendmail Address Processor Buffer Overflow
    2005-06-01
    oval:org.debian:def:257
    V
    remote exploit
    2003-03-04
    BACK
    sendmail advanced message server 1.2
    sendmail advanced message server 1.3
    sendmail sendmail 2.6
    sendmail sendmail 2.6.1
    sendmail sendmail 3.0
    sendmail sendmail 3.0.1
    sendmail sendmail 3.0.2
    sendmail sendmail 5.59
    sendmail sendmail 5.61
    sendmail sendmail 5.65
    sendmail sendmail 8.8.8
    sendmail sendmail 8.9.0
    sendmail sendmail 8.9.1
    sendmail sendmail 8.9.2
    sendmail sendmail 8.9.3
    sendmail sendmail 8.10
    sendmail sendmail 8.10.1
    sendmail sendmail 8.10.2
    sendmail sendmail 8.11.0
    sendmail sendmail 8.11.1
    sendmail sendmail 8.11.2
    sendmail sendmail 8.11.3
    sendmail sendmail 8.11.4
    sendmail sendmail 8.11.5
    sendmail sendmail 8.11.6
    sendmail sendmail 8.12 beta10
    sendmail sendmail 8.12 beta12
    sendmail sendmail 8.12 beta16
    sendmail sendmail 8.12 beta5
    sendmail sendmail 8.12 beta7
    sendmail sendmail 8.12.0
    sendmail sendmail 8.12.1
    sendmail sendmail 8.12.2
    sendmail sendmail 8.12.3
    sendmail sendmail 8.12.4
    sendmail sendmail 8.12.5
    sendmail sendmail 8.12.6
    sendmail sendmail 8.12.7
    sendmail sendmail switch 2.1
    sendmail sendmail switch 2.1.1
    sendmail sendmail switch 2.1.2
    sendmail sendmail switch 2.1.3
    sendmail sendmail switch 2.1.4
    sendmail sendmail switch 2.2
    sendmail sendmail switch 2.2.1
    sendmail sendmail switch 2.2.2
    sendmail sendmail switch 2.2.3
    sendmail sendmail switch 2.2.4
    sendmail sendmail switch 3.0
    sendmail sendmail switch 3.0.1
    sendmail sendmail switch 3.0.2
    sgi freeware 1.0
    gentoo linux 1.4 rc1
    gentoo linux 1.4 rc2
    hp hp-ux 10.10
    hp hp-ux 10.20
    hp hp-ux 11.00
    hp hp-ux 11.0.4
    hp hp-ux 11.11
    hp hp-ux 11.22
    netbsd netbsd 1.5
    netbsd netbsd 1.5.1
    netbsd netbsd 1.5.2
    netbsd netbsd 1.5.3
    netbsd netbsd 1.6
    sun solaris 2.6
    sun solaris 7.0
    sun solaris 8.0
    sun solaris 9.0
    sun solaris 9.0
    sun sunos -
    sun sunos 5.7
    sun sunos 5.8
    windriver bsdos 4.2
    windriver bsdos 4.3.1
    windriver bsdos 5.0
    windriver platform sa 1.0
    hp alphaserver sc *
    hp hp-ux 10.20
    sendmail sendmail 8.8.8
    sendmail sendmail 8.12.0
    sendmail sendmail 8.12.6
    sendmail sendmail 8.11.1
    sendmail sendmail 8.9.3
    sendmail sendmail 8.12.1
    sendmail sendmail 8.12.2
    sendmail sendmail 8.12.3
    sendmail sendmail 8.12.4
    sendmail sendmail 8.12.5
    sendmail sendmail 8.12.7
    sendmail sendmail 8.12 beta7
    sendmail sendmail 8.12 beta5
    sendmail sendmail 8.12 beta16
    sendmail sendmail 8.12 beta12
    sendmail sendmail 8.12 beta10
    sendmail sendmail 8.11.6
    sendmail sendmail 8.11.5
    sendmail sendmail 8.11.4
    sendmail sendmail 8.11.3
    sendmail sendmail 8.11.2
    sendmail sendmail 8.11.0
    sendmail sendmail 8.10.2
    sendmail sendmail 8.10.1
    sendmail sendmail 8.9.2
    sendmail sendmail 8.9.1
    sendmail sendmail 8.9.0
    sendmail sendmail 8.8.8
    sendmail sendmail 8.10
    sun solaris 2.6
    hp hp-ux 11.00
    compaq tru64 4.0f
    ibm aix 4.3
    sun solaris 8
    redhat linux 6.2
    freebsd freebsd 4.0
    hp hp-ux 11.04
    debian debian linux 2.2
    redhat linux 7
    freebsd freebsd 4.1.1
    hp hp-ux 11.11
    freebsd freebsd 4.1
    mandrakesoft mandrake linux 7.2
    netbsd netbsd 1.5
    compaq tru64 4.0g
    conectiva linux 6.0
    mandrakesoft mandrake linux corporate server 1.0.1
    freebsd freebsd 4.2
    suse suse linux 7.1
    ibm aix 5.1
    redhat linux 7.1
    mandrakesoft mandrake linux 8.0
    suse suse linux 7.2
    freebsd freebsd 4.3
    conectiva linux 7.0
    netbsd netbsd 1.5.1
    compaq tru64 5.0a
    compaq tru64 5.1
    compaq tru64 5.1a
    mandrakesoft mandrake linux 8.1
    debian debian linux 2.0
    redhat linux 7.2
    suse suse linux 7.3
    freebsd freebsd 4.4
    netbsd netbsd 1.5.2
    suse suse linux firewall *
    suse suse linux database server *
    suse suse linux connectivity server *
    sun cobalt raq xtr *
    mandrakesoft mandrake linux 8.2
    suse suse linux 8.0
    conectiva linux 8.0
    redhat linux 7.3
    freebsd freebsd 4.5
    sun solaris 9
    debian debian linux 3.0
    freebsd freebsd 4.6
    openpkg openpkg current
    gentoo linux *
    freebsd freebsd 4.6.1 release_p10
    suse suse linux office server *
    netbsd netbsd 1.5.3
    netbsd netbsd 1.6
    redhat linux 8.0
    openpkg openpkg 1.1
    hp hp-ux 11.22
    mandrakesoft mandrake linux 9.0
    suse suse linux 8.1
    suse linux enterprise server 8
    netbsd netbsd current
    openpkg openpkg 1.2
    ibm aix 5.2
    freebsd freebsd 4.7
    mandrakesoft mandrake linux corporate server 2.1
    compaq tru64 5.1b
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    redhat enterprise linux 2.1
    sgi irix 6.5.19
    sun solaris 7.0
    redhat linux advanced workstation 2.1
    mandrakesoft mandrake linux 8.0
    mandrakesoft mandrake linux 8.1
    mandrakesoft mandrake linux 8.2
    freebsd freebsd 4.6.2