Vulnerability Name: CVE-2006-4434 (CCN-28662) Assigned: 2006-08-09 Published: 2006-08-09 Updated: 2011-03-10 Summary: Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced.Note : the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected." CVSS v3 Severity: 5.9 Medium (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:N/A:H )Exploitability Metrics: Attack Vector (AV): NetworkAttack Complexity (AC): HighPrivileges Required (PR): NoneUser Interaction (UI): NoneScope: Scope (S): UnchangedImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): High
CVSS v2 Severity: 5.0 Medium (CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P )3.7 Low (Temporal CVSS v2 Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): LowAuthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Partial
5.4 Medium (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C )4.0 Medium (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:N/A:C/E:U/RL:OF/RC:C )Exploitability Metrics: Access Vector (AV): NetworkAccess Complexity (AC): HighAthentication (Au): NoneImpact Metrics: Confidentiality (C): NoneIntegrity (I): NoneAvailibility (A): Complete
Vulnerability Type: CWE-399 Vulnerability Consequences: Denial of Service References: Source: MITRE Type: CNACVE-2006-4434 Source: CCN Type: SA21637Sendmail Long Header Denial of Service Vulnerability Source: SECUNIA Type: Patch, Vendor Advisory21637 Source: SECUNIA Type: Patch, Vendor Advisory21641 Source: SECUNIA Type: Vendor Advisory21696 Source: SECUNIA Type: Vendor Advisory21700 Source: SECUNIA Type: Vendor Advisory21749 Source: CCN Type: SA22369Sun Solaris Sendmail Long Header Denial of Service Source: SECUNIA Type: Vendor Advisory22369 Source: CCN Type: SA32704IBM AIX update for sendmail Source: CCN Type: SECTRACK ID: 1016753Sendmail May Crash When Processing Mail with a Long Header Source: SECTRACK Type: Patch1016753 Source: CCN Type: Sun Alert ID: 102664A "Use-after-free" Vulnerability in Sendmail Versions Before 8.13.8 may Allow a Denial of Service (DoS) Source: SUNALERT Type: UNKNOWN102664 Source: CCN Type: IBM APAR IZ25577SENDMAIL VULNERABILITY (CVE-2006-4434) Source: CCN Type: IBM APAR IZ24183SENDMAIL VULNERABILITY (CVE-2006-4434) Source: CCN Type: IBM APAR IZ25563SENDMAIL VULNERABILITY (CVE-2006-4434) Source: CCN Type: IBM APAR IZ25570SENDMAIL VULNERABILITY (CVE-2006-4434) Source: VIM Type: UNKNOWN20060829 Sendmail vendor dispute - CVE-2006-4434 (fwd) Source: DEBIAN Type: UNKNOWNDSA-1164 Source: DEBIAN Type: DSA-1164sendmail -- programming error Source: MANDRIVA Type: UNKNOWNMDKSA-2006:156 Source: SUSE Type: UNKNOWNSUSE-SR:2006:021 Source: CCN Type: OpenBSD 3.9 errata005: SECURITY FIX: August 25, 2006 Source: OPENBSD Type: UNKNOWN[3.9] 20060825 005: SECURITY FIX: August 25, 2006 Source: CCN Type: OpenBSD 3.8 errata010: SECURITY FIX: August 25, 2006 Source: OPENBSD Type: UNKNOWN[3.8] 20060825 010: SECURITY FIX: August 25, 2006 Source: OSVDB Type: UNKNOWN28193 Source: CCN Type: OSVDB ID: 28193Sendmail Header Processing Overflow DoS Source: BID Type: Patch19714 Source: CCN Type: BID-19714Sendmail Long Header Denial Of Service Vulnerability Source: CCN Type: Sendmail.orgSendmail 8.13.8 Source: CONFIRM Type: Patchhttp://www.sendmail.org/releases/8.13.8.html Source: CCN Type: TLSA-2006-28sendmail denial of service attack Source: VUPEN Type: Vendor AdvisoryADV-2006-3393 Source: VUPEN Type: Vendor AdvisoryADV-2006-3994 Source: XF Type: UNKNOWNsendmail-long-header-dos(28662) Source: SUSE Type: SUSE-SR:2006:021SUSE Security Summary Report Vulnerable Configuration: Configuration 1 :cpe:/a:sendmail:sendmail:4.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:4.55:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:5.59:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:5.61:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:5.65:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.6:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.7:*:*:*:*:*:*:* Configuration CCN 1 :cpe:/a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:5.59:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:5.61:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:5.65:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.7:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.6:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.10:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:4.55:*:*:*:*:*:*:* OR cpe:/a:sendmail:sendmail:4.1:*:*:*:*:*:*:* AND cpe:/o:ibm:aix:6.1:*:*:*:*:*:*:* OR cpe:/o:ibm:aix:5.3:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0:*:*:*:*:*:*:* OR cpe:/o:debian:debian_linux:3.1:*:*:*:*:*:*:* OR cpe:/a:mandrakesoft:mandrake_multi_network_firewall:2.0:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:3.8:*:*:*:*:*:*:* OR cpe:/o:openbsd:openbsd:3.9:*:*:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux:2006::x86-64:*:*:*:*:* OR cpe:/o:mandrakesoft:mandrake_linux_corporate_server:3.0::x86_64:*:*:*:*:* OR cpe:/o:turbolinux:turbolinux:*:*:personal:*:*:*:*:* Denotes that component is vulnerable Oval Definitions BACK
sendmail sendmail 4.1
sendmail sendmail 4.55
sendmail sendmail 5.59
sendmail sendmail 5.61
sendmail sendmail 5.65
sendmail sendmail 8.8.8
sendmail sendmail 8.9.0
sendmail sendmail 8.9.1
sendmail sendmail 8.9.2
sendmail sendmail 8.9.3
sendmail sendmail 8.10
sendmail sendmail 8.10.1
sendmail sendmail 8.10.2
sendmail sendmail 8.11.0
sendmail sendmail 8.11.1
sendmail sendmail 8.11.2
sendmail sendmail 8.11.3
sendmail sendmail 8.11.4
sendmail sendmail 8.11.5
sendmail sendmail 8.11.6
sendmail sendmail 8.11.7
sendmail sendmail 8.12 beta10
sendmail sendmail 8.12 beta12
sendmail sendmail 8.12 beta16
sendmail sendmail 8.12 beta5
sendmail sendmail 8.12 beta7
sendmail sendmail 8.12.0
sendmail sendmail 8.12.1
sendmail sendmail 8.12.2
sendmail sendmail 8.12.3
sendmail sendmail 8.12.4
sendmail sendmail 8.12.5
sendmail sendmail 8.12.6
sendmail sendmail 8.12.7
sendmail sendmail 8.12.8
sendmail sendmail 8.12.9
sendmail sendmail 8.12.10
sendmail sendmail 8.12.11
sendmail sendmail 8.13.3
sendmail sendmail 8.13.4
sendmail sendmail 8.13.5
sendmail sendmail 8.13.6
sendmail sendmail 8.13.7
sendmail sendmail 8.12.0
sendmail sendmail 8.12.6
sendmail sendmail 5.59
sendmail sendmail 8.11.1
sendmail sendmail 8.9.3
sendmail sendmail 8.12.1
sendmail sendmail 8.12.2
sendmail sendmail 8.12.3
sendmail sendmail 8.12.4
sendmail sendmail 8.12.5
sendmail sendmail 5.61
sendmail sendmail 5.65
sendmail sendmail 8.13.7
sendmail sendmail 8.13.6
sendmail sendmail 8.13.5
sendmail sendmail 8.13.4
sendmail sendmail 8.13.3
sendmail sendmail 8.12.11
sendmail sendmail 8.12.9
sendmail sendmail 8.12.8
sendmail sendmail 8.12.7
sendmail sendmail 8.12 beta7
sendmail sendmail 8.12 beta5
sendmail sendmail 8.12 beta16
sendmail sendmail 8.12 beta12
sendmail sendmail 8.12 beta10
sendmail sendmail 8.12.10
sendmail sendmail 8.11.7
sendmail sendmail 8.11.6
sendmail sendmail 8.11.5
sendmail sendmail 8.11.4
sendmail sendmail 8.11.3
sendmail sendmail 8.11.2
sendmail sendmail 8.11.0
sendmail sendmail 8.10.2
sendmail sendmail 8.10.1
sendmail sendmail 8.10
sendmail sendmail 8.9.2
sendmail sendmail 8.9.1
sendmail sendmail 8.9.0
sendmail sendmail 8.8.8
sendmail sendmail 4.55
sendmail sendmail 4.1
ibm aix 6.1
ibm aix 5.3
mandrakesoft mandrake linux corporate server 3.0
debian debian linux 3.1
mandrakesoft mandrake multi network firewall 2.0
mandrakesoft mandrake linux 2006
openbsd openbsd 3.8
openbsd openbsd 3.9
mandrakesoft mandrake linux 2006
mandrakesoft mandrake linux corporate server 3.0
turbolinux turbolinux personal *