Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2003-0161

Опубликовано: 29 мар. 2003
Источник: redhat
EPSS Высокий

Описание

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.

Дополнительная информация

Статус:

Critical

EPSS

Процентиль: 99%
0.71952
Высокий

Связанные уязвимости

nvd
больше 22 лет назад

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.

debian
больше 22 лет назад

The prescan() function in the address parser (parseaddr.c) in Sendmail ...

github
около 3 лет назад

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.

EPSS

Процентиль: 99%
0.71952
Высокий