Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-2vpw-h4q9-62fp

Опубликовано: 03 мая 2022
Источник: github
Github: Не прошло ревью

Описание

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

EPSS

Процентиль: 98%
0.623
Средний

Связанные уязвимости

redhat
больше 22 лет назад

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

nvd
больше 22 лет назад

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

debian
больше 22 лет назад

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to ...

EPSS

Процентиль: 98%
0.623
Средний