Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2002-1337

Опубликовано: 07 мар. 2003
Источник: debian
EPSS Средний

Описание

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
sendmailfixed8.13.0.PreAlpha4-0package
sendmail-wineremovedpackage

Примечания

  • problem in sendmail 8.12, sarge uses 8.13

EPSS

Процентиль: 98%
0.623
Средний

Связанные уязвимости

redhat
больше 22 лет назад

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

nvd
больше 22 лет назад

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

github
около 3 лет назад

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

EPSS

Процентиль: 98%
0.623
Средний
Уязвимость CVE-2002-1337