Description
The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Product(s):
- Sendmail Sendmail Advanced Message Server 1.2
- Sendmail Sendmail Advanced Message Server 1.3
- Sendmail Sendmail 2.6.1
- Sendmail Sendmail 2.6.2
- Sendmail Sendmail 2.6
- Sendmail Sendmail 3.0.1
- Sendmail Sendmail 3.0.2
- Sendmail Sendmail 3.0.3
- Sendmail Sendmail 3.0
- Sendmail Sendmail 8.10.1
- Sendmail Sendmail 8.10.2
- Sendmail Sendmail 8.10
- Sendmail Sendmail 8.11
- Sendmail Sendmail 8.11.1
- Sendmail Sendmail 8.11.2
- Sendmail Sendmail 8.11.3
- Sendmail Sendmail 8.11.4
- Sendmail Sendmail 8.11.5
- Sendmail Sendmail 8.11.6
- Sendmail Sendmail 8.12.0
- Sendmail Sendmail 8.12.1
- Sendmail Sendmail 8.12.2
- Sendmail Sendmail 8.12.3
- Sendmail Sendmail 8.12.4
- Sendmail Sendmail 8.12.5
- Sendmail Sendmail 8.12.6
- Sendmail Sendmail 8.12.7
- Sendmail Sendmail 8.12.8
- Sendmail Sendmail 8.12.9
- Sendmail Sendmail 8.12 Beta10
- Sendmail Sendmail 8.12 Beta12
- Sendmail Sendmail 8.12 Beta16
- Sendmail Sendmail 8.12 Beta5
- Sendmail Sendmail 8.12 beta7
- Sendmail Sendmail 8.8.8
- Sendmail Sendmail 8.9.0
- Sendmail Sendmail 8.9.1
- Sendmail Sendmail 8.9.2
- Sendmail Sendmail 8.9.3
- Sendmail Sendmail Pro 8.9.2
- Sendmail Sendmail Pro 8.9.3
- Sendmail Switch 2.1.1
- Sendmail Switch 2.1.2
- Sendmail Switch 2.1.3
- Sendmail Switch 2.1.4
- Sendmail Switch 2.1.5
- Sendmail Switch 2.1
- Sendmail Switch 2.2.1
- Sendmail Switch 2.2.2
- Sendmail Switch 2.2.3
- Sendmail Switch 2.2.4
- Sendmail Switch 2.2.5
- Sendmail Switch 2.2
- Sendmail Switch 3.0.1
- Sendmail Switch 3.0.2
- Sendmail Switch 3.0.3
- Sendmail Switch 3.0
- Apple Mac OS X 10.2.1
- Apple Mac OS X 10.2.2
- Apple Mac OS X 10.2.3
- Apple Mac OS X 10.2.4
- Apple Mac OS X 10.2.5
- Apple Mac OS X 10.2.6
- Apple Mac OS X 10.2
- Apple Mac OS X Server 10.2.1
- Apple Mac OS X Server 10.2.2
- Apple Mac OS X Server 10.2.3
- Apple Mac OS X Server 10.2.4
- Apple Mac OS X Server 10.2.5
- Apple Mac OS X Server 10.2.6
- Apple Mac OS X Server 10.2
- Compaq Tru64 4.0f
- Compaq Tru64 4.0f PK6_BL17
- Compaq Tru64 4.0f PK7_BL18
- Compaq Tru64 4.0f PK8_BL22
- Compaq Tru64 4.0g
- Compaq Tru64 4.0g PK3_BL17
- Compaq Tru64 4.0g PK4_BL22
- Compaq Tru64 5.1
- Compaq Tru64 5.1 PK3_BL17
- Compaq Tru64 5.1 PK4_BL18
- Compaq Tru64 5.1 PK5_BL19
- Compaq Tru64 5.1 PK6_BL20
- Compaq Tru64 5.1a
- Compaq Tru64 5.1a PK1_BL1
- Compaq Tru64 5.1a PK2_BL2
- Compaq Tru64 5.1a PK3_BL3
- Compaq Tru64 5.1a PK4_BL21
- Compaq Tru64 5.1a PK5_BL23
- Compaq Tru64 5.1b
- Compaq Tru64 5.1b PK1_BL1
- Compaq Tru64 5.1b PK2_BL22
- FreeBSD 3.0 Releng
- FreeBSD 4.0 Releng
- FreeBSD 4.3 Release P38
- FreeBSD 4.3 Releng
- FreeBSD 4.4 Release P42
- FreeBSD 4.4 Releng
- FreeBSD 4.5 Release P32
- FreeBSD 4.5 Releng
- +67 additional
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2003-0694, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2003-0694 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.