Resource Management Errors Affecting sendmail package, versions <8.13.8-1


Severity

Recommended
0.0
high
0
10

Snyk's Security Team recommends NVD's CVSS assessment. Learn more

Threat Intelligence

EPSS
12.81% (96th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-DEBIAN8-SENDMAIL-310690
  • published29 Aug 2006
  • disclosed29 Aug 2006

Introduced: 29 Aug 2006

CVE-2006-4434  (opens in a new tab)
CWE-399  (opens in a new tab)

How to fix?

Upgrade Debian:8 sendmail to version 8.13.8-1 or higher.

NVD Description

Note: Versions mentioned in the description apply only to the upstream sendmail package and not the sendmail package as distributed by Debian. See How to fix? for Debian:8 relevant fixed versions and status.

Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."

CVSS Scores

version 3.1