CVE-2003-0161 Affecting sendmail package, versions <8.12.9-1


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
27.97% (97th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN8-SENDMAIL-310654
  • published2 Apr 2003
  • disclosed2 Apr 2003

Introduced: 2 Apr 2003

CVE-2003-0161  (opens in a new tab)

How to fix?

Upgrade Debian:8 sendmail to version 8.12.9-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream sendmail package and not the sendmail package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.

CVSS Scores

version 3.1