Description
Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the configuration file whose names contain characters with the high bit set, such as (1) macro names that are one character long, (2) a variable setting which is processed by the setoption function, or (3) a Modifiers setting which is processed by the getmodifiers function.
Products
- Sendmail Sendmail
- Sendmail Sendmail
- Sendmail Sendmail 2.6.1
- Sendmail Sendmail 2.6.2
- Sendmail Sendmail 2.6
- Sendmail Sendmail 3.0.1
- Sendmail Sendmail 3.0.2
- Sendmail Sendmail 3.0.3
- Sendmail Sendmail 3.0
- Sendmail Sendmail 4.1
- Sendmail Sendmail 8.10.0
- Sendmail Sendmail 8.10.1
- Sendmail Sendmail 8.10.2
- Sendmail Sendmail 8.10
- Sendmail Sendmail 8.11
- Sendmail Sendmail 8.11.1
- Sendmail Sendmail 8.11.2
- Sendmail Sendmail 8.11.3
- Sendmail Sendmail 8.11.4
- Sendmail Sendmail 8.11.5
- Sendmail Sendmail 8.11.6
- Sendmail Sendmail 8.11.7
- Sendmail Sendmail 8.12.0
- Sendmail Sendmail 8.12.1
- Sendmail Sendmail 8.12 Beta10
- Sendmail Sendmail 8.12 Beta12
- Sendmail Sendmail 8.12 Beta16
- Sendmail Sendmail 8.12 Beta5
- Sendmail Sendmail 8.12 beta7
- Sendmail Sendmail 8.6.7
- Sendmail Consortium 8.7.10
- Sendmail Consortium 8.7.6
- Sendmail Consortium 8.7.7
- Sendmail Consortium 8.7.8
- Sendmail Consortium 8.7.9
- Sendmail Sendmail 8.8.8
- Sendmail Sendmail 8.9.0
- Sendmail Sendmail 8.9.1
- Sendmail Sendmail 8.9.2
- Sendmail Sendmail 8.9.3
Questions to Ask Vendors
- Can you confirm whether your systems are affected by CVE-2001-0713, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2001-0713 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions
- Check out the advisory links provided below.
References