Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
References
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 00:08
Type | Values Removed | Values Added |
---|---|---|
References | () ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc - | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P - | |
References | () ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc - | |
References | () http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635 - | |
References | () http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html - | |
References | () http://secunia.com/advisories/15779 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/20473 - Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/20641 - Vendor Advisory | |
References | () http://secunia.com/advisories/20650 - Vendor Advisory | |
References | () http://secunia.com/advisories/20651 - Vendor Advisory | |
References | () http://secunia.com/advisories/20654 - Vendor Advisory | |
References | () http://secunia.com/advisories/20673 - Vendor Advisory | |
References | () http://secunia.com/advisories/20675 - Vendor Advisory | |
References | () http://secunia.com/advisories/20679 - Vendor Advisory | |
References | () http://secunia.com/advisories/20683 - Vendor Advisory | |
References | () http://secunia.com/advisories/20684 - Vendor Advisory | |
References | () http://secunia.com/advisories/20694 - Vendor Advisory | |
References | () http://secunia.com/advisories/20726 - Vendor Advisory | |
References | () http://secunia.com/advisories/20782 - Vendor Advisory | |
References | () http://secunia.com/advisories/21042 - Vendor Advisory | |
References | () http://secunia.com/advisories/21160 - Vendor Advisory | |
References | () http://secunia.com/advisories/21327 - Vendor Advisory | |
References | () http://secunia.com/advisories/21612 - Vendor Advisory | |
References | () http://secunia.com/advisories/21647 - Vendor Advisory | |
References | () http://securitytracker.com/id?1016295 - | |
References | () http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.631382 - | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1 - Patch, Vendor Advisory | |
References | () http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm - | |
References | () http://www-1.ibm.com/support/search.wss?rs=0&q=IY85415&apar=only - | |
References | () http://www-1.ibm.com/support/search.wss?rs=0&q=IY85930&apar=only - | |
References | () http://www.debian.org/security/2006/dsa-1155 - | |
References | () http://www.f-secure.com/security/fsc-2006-5.shtml - | |
References | () http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml - | |
References | () http://www.kb.cert.org/vuls/id/146718 - Third Party Advisory, US Government Resource | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:104 - | |
References | () http://www.openbsd.org/errata38.html#sendmail2 - | |
References | () http://www.osvdb.org/26197 - | |
References | () http://www.redhat.com/support/errata/RHSA-2006-0515.html - | |
References | () http://www.securityfocus.com/archive/1/437928/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/438241/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/438330/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/440744/100/0/threaded - | |
References | () http://www.securityfocus.com/archive/1/442939/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/18433 - Patch | |
References | () http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc - Patch, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/2189 - | |
References | () http://www.vupen.com/english/advisories/2006/2351 - | |
References | () http://www.vupen.com/english/advisories/2006/2388 - | |
References | () http://www.vupen.com/english/advisories/2006/2389 - Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/2390 - | |
References | () http://www.vupen.com/english/advisories/2006/2798 - | |
References | () http://www.vupen.com/english/advisories/2006/3135 - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/27128 - | |
References | () https://issues.rpath.com/browse/RPL-526 - | |
References | () https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253 - |
Information
Published : 2006-06-07 23:06
Updated : 2024-11-21 00:08
NVD link : CVE-2006-1173
Mitre link : CVE-2006-1173
CVE.ORG link : CVE-2006-1173
JSON object : View
Products Affected
sendmail
- sendmail
CWE
CWE-399
Resource Management Errors