Vulnerability Name: CVE-2006-1173 (CCN-27128) Assigned: 2006-06-08 Published: 2006-06-08 Updated: 2018-10-18 Summary: Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files. CVSS v3 Severity: 5.3 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:L )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): LowPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Low
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.0 Medium (CCN CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
Vulnerability Type: CWE-399 Vulnerability Consequences: Denial of Service References: Source: FREEBSD Type: UNKNOWNFreeBSD-SA-06:17.sendmail Source: SGI Type: UNKNOWN20060601-01-P Source: CCN Type: SGI Security Advisory 20060601-01-PSecurity update for Sendmail Source: SGI Type: UNKNOWN20060602-01-U Source: MITRE Type: CNACVE-2006-1173 Source: HP Type: UNKNOWNHPSBTU02116 Source: SUSE Type: UNKNOWNSUSE-SA:2006:032 Source: CCN Type: RHSA-2006-0515sendmail security update Source: CCN Type: SA15779Sendmail Multi-Part MIME Message Handling Denial of Service Source: SECUNIA Type: Patch, Vendor Advisory15779 Source: CCN Type: SA20473HP Tru64 UNIX and HP Internet Express Sendmail Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory20473 Source: SECUNIA Type: Vendor Advisory20641 Source: SECUNIA Type: Vendor Advisory20650 Source: SECUNIA Type: Vendor Advisory20651 Source: SECUNIA Type: Vendor Advisory20654 Source: SECUNIA Type: Vendor Advisory20673 Source: SECUNIA Type: Vendor Advisory20675 Source: SECUNIA Type: Vendor Advisory20679 Source: SECUNIA Type: Vendor Advisory20683 Source: SECUNIA Type: Vendor Advisory20684 Source: SECUNIA Type: Vendor Advisory20694 Source: CCN Type: SA20726FortiMail Sendmail Multi-Part MIME Message Handling Vulnerability Source: SECUNIA Type: Vendor Advisory20726 Source: SECUNIA Type: Vendor Advisory20782 Source: CCN Type: SA21042F-Secure Messaging Security Gateway Sendmail Vulnerability Source: SECUNIA Type: Vendor Advisory21042 Source: SECUNIA Type: Vendor Advisory21160 Source: SECUNIA Type: Vendor Advisory21327 Source: SECUNIA Type: Vendor Advisory21612 Source: CCN Type: SA21647Avaya CMS / IR Sun Solaris Sendmail Denial of Service Source: SECUNIA Type: Vendor Advisory21647 Source: CCN Type: FreeBSD Security Advisory FreeBSD-SA-06:17.sendmailIncorrect multipart message handling in Sendmail Source: CCN Type: SECTRACK ID: 1016295Sendmail Excessive Recursion in Processing Malformed MIME Messages Lets Remote Users Deny Service Source: SECTRACK Type: UNKNOWN1016295 Source: SLACKWARE Type: UNKNOWNSSA:2006-166-01 Source: CCN Type: Sun Alert ID: 102460A Security Vulnerability in sendmail(1M) Versions Prior to 8.13.7 May Allow a Denial of Service (DoS) To Occur Source: SUNALERT Type: Patch, Vendor Advisory102460 Source: CCN Type: ASA-2006-139sendmail security update (RHSA-2006-0515) Source: CONFIRM Type: UNKNOWNhttp://support.avaya.com/elmodocs2/security/ASA-2006-148.htm Source: CCN Type: ASA-2006-148Sun Alert Notifications from Sun Weekly Report dated June 17 2006 Source: AIXAPAR Type: UNKNOWNIY85415 Source: AIXAPAR Type: UNKNOWNIY85930 Source: DEBIAN Type: UNKNOWNDSA-1155 Source: DEBIAN Type: DSA-1155sendmail -- programming error Source: CCN Type: F-Secure Security Bulletin FSC-2006-5Deeply nested malformed MIME denial of service attack Source: CONFIRM Type: UNKNOWNhttp://www.f-secure.com/security/fsc-2006-5.shtml Source: CONFIRM Type: UNKNOWNhttp://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html Source: CCN Type: GLSA-200606-19Sendmail: Denial of Service Source: GENTOO Type: UNKNOWNGLSA-200606-19 Source: CCN Type: US-CERT VU#146718Sendmail fails to handle malformed multipart MIME messages Source: CERT-VN Type: Third Party Advisory, US Government ResourceVU#146718 Source: MANDRIVA Type: UNKNOWNMDKSA-2006:104 Source: CCN Type: OpenBSD 3.9 release errata003: SECURITY FIX: June 15, 2006 Source: OPENBSD Type: UNKNOWN[3.8] 008: SECURITY FIX: June 15, 2006 Source: OSVDB Type: UNKNOWN26197 Source: CCN Type: OSVDB ID: 26197Sendmail Multi-Part MIME Message Handling DoS Source: REDHAT Type: UNKNOWNRHSA-2006:0515 Source: BUGTRAQ Type: UNKNOWN20060620 Sendmail MIME DoS vulnerability Source: BUGTRAQ Type: UNKNOWN20060621 Re: Sendmail MIME DoS vulnerability Source: BUGTRAQ Type: UNKNOWN20060624 Re: Sendmail MIME DoS vulnerability Source: BUGTRAQ Type: UNKNOWN20060721 rPSA-2006-0134-1 sendmail sendmail-cf Source: HP Type: UNKNOWNHPSBUX02124 Source: BID Type: Patch18433 Source: CCN Type: BID-18433Sendmail Malformed MIME Message Denial Of Service Vulnerability Source: CCN Type: Sendmail Web siteSendmail.com - Products - Routing, Policy, Directories, Storage and Access, Appliances Source: CCN Type: Sendmail, Inc. Security Advisory Sendmail-SA-200605-01Deeply nested malformed MIME denial of service attack Source: CONFIRM Type: Patch, Vendor Advisoryhttp://www.sendmail.com/security/advisories/SA-200605-01.txt.asc Source: CCN Type: TLSA-2006-9sendmail denial of service attack Source: VUPEN Type: UNKNOWNADV-2006-2189 Source: VUPEN Type: UNKNOWNADV-2006-2351 Source: VUPEN Type: UNKNOWNADV-2006-2388 Source: VUPEN Type: Vendor AdvisoryADV-2006-2389 Source: VUPEN Type: UNKNOWNADV-2006-2390 Source: VUPEN Type: UNKNOWNADV-2006-2798 Source: VUPEN Type: UNKNOWNADV-2006-3135 Source: XF Type: UNKNOWNsendmail-multipart-mime-dos(27128) Source: XF Type: UNKNOWNsendmail-multipart-mime-dos(27128) Source: CONFIRM Type: UNKNOWNhttps://issues.rpath.com/browse/RPL-526 Source: OVAL Type: UNKNOWNoval:org.mitre.oval:def:11253 Source: SUSE Type: SUSE-SA:2006:032sendmail remote denial of service Vulnerable Configuration: Configuration 1 :cpe:/a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:*:*:*:*:*:*:*:* (Version <= 8.13.6) Configuration RedHat 1 :cpe:/o:redhat:enterprise_linux:4:*:*:*:*:*:*:* Configuration RedHat 2 :cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* Configuration RedHat 3 :cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* Configuration RedHat 4 :cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* Configuration RedHat 5 :cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* Configuration CCN 1 :cpe:/a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:* OR cpe:/a:sendmail:intelligent_quarantine:3.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:advanced_message_server:-:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.6:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10:*:*:*:*:*:*:* OR cpe:/h:sendmail:sentrion:1.5.1:*:*:*:*:*:*:* AND cpe:/o:gentoo:linux:*:*:*:*:*:*:*:* OR cpe:/o:suse:linux_enterprise_server:8:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:2.1:*:ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::as:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.1:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:3::desktop:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.2:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::as:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::desktop:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::es:*:*:*:*:* OR cpe:/o:redhat:enterprise_linux:4::ws:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.0:*:oss:*:*:*:*:* OR cpe:/o:redhat:linux_advanced_workstation:2.1:*:itanium:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:3.9:*:*:*:*:*:*:* OR cpe:/o:suse:suse_linux:10.1:*:personal:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:x86_64:*:*:*:*:* OR cpe:/o:suse:suse_linux:9.3:*:*:*:*:*:*:* Denotes that component is vulnerable Oval Definitions Definition ID Class Title Last Modified oval:org.opensuse.security:def:20061173 V CVE-2006-1173 2015-11-16 oval:org.mitre.oval:def:11253 V Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files. 2013-04-29 oval:org.debian:def:1155 V programming error 2013-01-21 oval:com.redhat.rhsa:def:20060515 P RHSA-2006:0515: sendmail security update (Important) 2008-03-20
BACK
sendmail sendmail 8.8.8
sendmail sendmail 8.9.0
sendmail sendmail 8.9.1
sendmail sendmail 8.9.2
sendmail sendmail 8.9.3
sendmail sendmail 8.10
sendmail sendmail 8.10.1
sendmail sendmail 8.10.2
sendmail sendmail 8.11.0
sendmail sendmail 8.11.1
sendmail sendmail 8.11.2
sendmail sendmail 8.11.3
sendmail sendmail 8.11.4
sendmail sendmail 8.11.5
sendmail sendmail 8.11.6
sendmail sendmail 8.11.7
sendmail sendmail 8.12 beta10
sendmail sendmail 8.12 beta12
sendmail sendmail 8.12 beta16
sendmail sendmail 8.12 beta5
sendmail sendmail 8.12 beta7
sendmail sendmail 8.12.0
sendmail sendmail 8.12.1
sendmail sendmail 8.12.2
sendmail sendmail 8.12.3
sendmail sendmail 8.12.4
sendmail sendmail 8.12.5
sendmail sendmail 8.12.6
sendmail sendmail 8.12.7
sendmail sendmail 8.12.8
sendmail sendmail 8.12.9
sendmail sendmail 8.12.10
sendmail sendmail 8.12.11
sendmail sendmail 8.13.0
sendmail sendmail 8.13.1
sendmail sendmail 8.13.1.2
sendmail sendmail 8.13.2
sendmail sendmail 8.13.3
sendmail sendmail 8.13.4
sendmail sendmail 8.13.5
sendmail sendmail *
sendmail sendmail 8.12.0
sendmail sendmail 8.12.6
sendmail intelligent quarantine 3.0
sendmail advanced message server -
sendmail sendmail 8.11.1
sendmail sendmail 8.9.3
sendmail sendmail 8.12.1
sendmail sendmail 8.12.2
sendmail sendmail 8.12.3
sendmail sendmail 8.12.4
sendmail sendmail 8.12.5
sendmail sendmail 8.13.6
sendmail sendmail 8.13.5
sendmail sendmail 8.13.4
sendmail sendmail 8.13.3
sendmail sendmail 8.12.11
sendmail sendmail 8.12.9
sendmail sendmail 8.12.8
sendmail sendmail 8.12.7
sendmail sendmail 8.12 beta7
sendmail sendmail 8.12 beta5
sendmail sendmail 8.12 beta16
sendmail sendmail 8.12 beta12
sendmail sendmail 8.12 beta10
sendmail sendmail 8.12.10
sendmail sendmail 8.11.7
sendmail sendmail 8.11.6
sendmail sendmail 8.11.5
sendmail sendmail 8.11.4
sendmail sendmail 8.11.3
sendmail sendmail 8.11.2
sendmail sendmail 8.11.0
sendmail sendmail 8.10.2
sendmail sendmail 8.10.1
sendmail sendmail 8.9.2
sendmail sendmail 8.9.1
sendmail sendmail 8.9.0
sendmail sendmail 8.8.8
sendmail sendmail 8.10
sendmail sentrion 1.5.1
gentoo linux *
suse linux enterprise server 8
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 2.1
redhat enterprise linux 3
redhat enterprise linux 3
redhat enterprise linux 3
suse suse linux 9.1
redhat enterprise linux 3
suse suse linux 9.2
mandrakesoft mandrake linux corporate server 3.0
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
redhat enterprise linux 4
debian debian linux 3.1
mandrakesoft mandrake multi network firewall 2.0
suse suse linux 10.0
redhat linux advanced workstation 2.1
mandrakesoft mandrake linux 2006
openbsd openbsd 3.9
suse suse linux 10.1
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux corporate server 3.0
suse suse linux 9.3