Описание
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
Ссылки
- https://nvd.nist.gov/vuln/detail/CVE-2006-0058
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24584
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11074
- https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1689
- http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00629555
- http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635
- http://secunia.com/advisories/19342
- http://secunia.com/advisories/19345
- http://secunia.com/advisories/19346
- http://secunia.com/advisories/19349
- http://secunia.com/advisories/19356
- http://secunia.com/advisories/19360
- http://secunia.com/advisories/19361
- http://secunia.com/advisories/19363
- http://secunia.com/advisories/19367
- http://secunia.com/advisories/19368
- http://secunia.com/advisories/19394
- http://secunia.com/advisories/19404
- http://secunia.com/advisories/19407
- http://secunia.com/advisories/19450
- http://secunia.com/advisories/19466
- http://secunia.com/advisories/19532
- http://secunia.com/advisories/19533
- http://secunia.com/advisories/19676
- http://secunia.com/advisories/19774
- http://secunia.com/advisories/20243
- http://secunia.com/advisories/20723
- http://securityreason.com/securityalert/612
- http://securityreason.com/securityalert/743
- http://securitytracker.com/id?1015801
- http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.619600
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102262-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-26-102324-1
- http://sunsolve.sun.com/search/document.do?assetkey=1-66-200494-1
- http://support.avaya.com/elmodocs2/security/ASA-2006-074.htm
- http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm
- http://www-1.ibm.com/support/search.wss?rs=0&q=IY82992&apar=only
- http://www-1.ibm.com/support/search.wss?rs=0&q=IY82993&apar=only
- http://www-1.ibm.com/support/search.wss?rs=0&q=IY82994&apar=only
- http://www.ciac.org/ciac/bulletins/q-151.shtml
- http://www.debian.org/security/2006/dsa-1015
- http://www.f-secure.com/security/fsc-2006-2.shtml
- http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml
- http://www.iss.net/threats/216.html
- http://www.kb.cert.org/vuls/id/834865
- http://www.mandriva.com/security/advisories?name=MDKSA-2006:058
- http://www.novell.com/linux/security/advisories/2006_17_sendmail.html
- http://www.openbsd.org/errata38.html#sendmail
- http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.007-sendmail.html
- http://www.osvdb.org/24037
- http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00017.html
- http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00018.html
- http://www.redhat.com/support/errata/RHSA-2006-0264.html
- http://www.redhat.com/support/errata/RHSA-2006-0265.html
- http://www.securityfocus.com/archive/1/428536/100/0/threaded
- http://www.securityfocus.com/archive/1/428656/100/0/threaded
- http://www.securityfocus.com/bid/17192
- http://www.sendmail.com/company/advisory/index.shtml
- http://www.us-cert.gov/cas/techalerts/TA06-081A.html
- http://www.vupen.com/english/advisories/2006/1049
- http://www.vupen.com/english/advisories/2006/1051
- http://www.vupen.com/english/advisories/2006/1068
- http://www.vupen.com/english/advisories/2006/1072
- http://www.vupen.com/english/advisories/2006/1139
- http://www.vupen.com/english/advisories/2006/1157
- http://www.vupen.com/english/advisories/2006/1529
- http://www.vupen.com/english/advisories/2006/2189
- http://www.vupen.com/english/advisories/2006/2490
- http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688
- http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751
EPSS
CVE ID
Связанные уязвимости
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows ...
EPSS