Description
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
Product(s):
- Sendmail Sendmail Advanced Message Server 1.2
- Sendmail Sendmail Advanced Message Server 1.3
- Sendmail Sendmail 2.6.1
- Sendmail Sendmail 2.6.2
- Sendmail Sendmail 2.6
- Sendmail Sendmail 3.0.1
- Sendmail Sendmail 3.0.2
- Sendmail Sendmail 3.0.3
- Sendmail Sendmail 3.0
- Sendmail Sendmail 8.10.1
- Sendmail Sendmail 8.10.2
- Sendmail Sendmail 8.10
- Sendmail Sendmail 8.11
- Sendmail Sendmail 8.11.1
- Sendmail Sendmail 8.11.2
- Sendmail Sendmail 8.11.3
- Sendmail Sendmail 8.11.4
- Sendmail Sendmail 8.11.5
- Sendmail Sendmail 8.11.6
- Sendmail Sendmail 8.12.0
- Sendmail Sendmail 8.12.1
- Sendmail Sendmail 8.12.2
- Sendmail Sendmail 8.12.3
- Sendmail Sendmail 8.12.4
- Sendmail Sendmail 8.12.5
- Sendmail Sendmail 8.12.6
- Sendmail Sendmail 8.12.7
- Sendmail Sendmail 8.12.8
- Sendmail Sendmail 8.12.9
- Sendmail Sendmail 8.12 Beta10
- Sendmail Sendmail 8.12 Beta12
- Sendmail Sendmail 8.12 Beta16
- Sendmail Sendmail 8.12 Beta5
- Sendmail Sendmail 8.12 beta7
- Sendmail Sendmail 8.8.8
- Sendmail Sendmail 8.9.0
- Sendmail Sendmail 8.9.1
- Sendmail Sendmail 8.9.2
- Sendmail Sendmail 8.9.3
- Sendmail Sendmail Pro 8.9.2
- Sendmail Sendmail Pro 8.9.3
- Sendmail Switch 2.1.1
- Sendmail Switch 2.1.2
- Sendmail Switch 2.1.3
- Sendmail Switch 2.1.4
- Sendmail Switch 2.1.5
- Sendmail Switch 2.1
- Sendmail Switch 2.2.1
- Sendmail Switch 2.2.2
- Sendmail Switch 2.2.3
- Sendmail Switch 2.2.4
- Sendmail Switch 2.2.5
- Sendmail Switch 2.2
- Sendmail Switch 3.0.1
- Sendmail Switch 3.0.2
- Sendmail Switch 3.0.3
- Sendmail Switch 3.0
- Apple Mac OS X 10.2.1
- Apple Mac OS X 10.2.2
- Apple Mac OS X 10.2.3
- Apple Mac OS X 10.2.4
- Apple Mac OS X 10.2.5
- Apple Mac OS X 10.2.6
- Apple Mac OS X 10.2
- Apple Mac OS X Server 10.2.1
- Apple Mac OS X Server 10.2.2
- Apple Mac OS X Server 10.2.3
- Apple Mac OS X Server 10.2.4
- Apple Mac OS X Server 10.2.5
- Apple Mac OS X Server 10.2.6
- Apple Mac OS X Server 10.2
- Gentoo Linux 0.5
- Gentoo Linux 0.7
- Gentoo Linux 1.1a
- Gentoo Linux 1.2
- Gentoo Linux 1.4 rc1
- Gentoo Linux 1.4 rc2
- Gentoo Linux 1.4 rc3
- HP HP-UX 11.0.4
- HP-UX 11.00
- HP-UX 11.11
- HP-UX 11i v1.6
- IBM AIX 4.3.3
- IBM AIX 5.1
- IBM AIX 5.2
- NetBSD 1.4.3
- NetBSD 1.5.1
- NetBSD 1.5.2
- NetBSD 1.5.3
- NetBSD 1.5
- NetBSD 1.5 on SH3
- NetBSD 1.5 on x86
- NetBSD 1.6.1
- NetBSD 1.6
- NetBSD 1.6 Beta
- OpenBSD 3.2
- OpenBSD 3.3
- Turbolinux Advanced Server 6.0
- Turbolinux Server 6.1
- Turbolinux Server 6.5
- +5 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2003-0681, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2003-0681 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.