CVE-2002-1337 Affecting sendmail package, versions <8.13.0.PreAlpha4-0


Severity

Recommended
0.0
critical
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
85.96% (99th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN8-SENDMAIL-310658
  • published7 Mar 2003
  • disclosed7 Mar 2003

Introduced: 7 Mar 2003

CVE-2002-1337  (opens in a new tab)

How to fix?

Upgrade Debian:8 sendmail to version 8.13.0.PreAlpha4-0 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream sendmail package and not the sendmail package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

CVSS Scores

version 3.1