Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."
References
Configurations
History
21 Nov 2024, 00:15
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/21637 - Broken Link, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/21641 - Broken Link, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/21696 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/21700 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/21749 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/22369 - Broken Link, Vendor Advisory | |
References | () http://securitytracker.com/id?1016753 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1 - Broken Link | |
References | () http://www.attrition.org/pipermail/vim/2006-August/000999.html - Mailing List | |
References | () http://www.debian.org/security/2006/dsa-1164 - Broken Link | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:156 - Broken Link | |
References | () http://www.novell.com/linux/security/advisories/2006_21_sr.html - Broken Link | |
References | () http://www.openbsd.org/errata.html#sendmail3 - Release Notes | |
References | () http://www.openbsd.org/errata38.html#sendmail3 - Third Party Advisory | |
References | () http://www.osvdb.org/28193 - Broken Link | |
References | () http://www.securityfocus.com/bid/19714 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | () http://www.sendmail.org/releases/8.13.8.html - Release Notes | |
References | () http://www.vupen.com/english/advisories/2006/3393 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3994 - Broken Link, Vendor Advisory |
15 Feb 2024, 21:20
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 5.0
v3 : 7.5 |
CWE | CWE-416 | |
References | () http://secunia.com/advisories/21637 - Broken Link, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/21641 - Broken Link, Patch, Vendor Advisory | |
References | () http://secunia.com/advisories/21696 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/21700 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/21749 - Broken Link, Vendor Advisory | |
References | () http://secunia.com/advisories/22369 - Broken Link, Vendor Advisory | |
References | () http://securitytracker.com/id?1016753 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | () http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1 - Broken Link | |
References | () http://www.attrition.org/pipermail/vim/2006-August/000999.html - Mailing List | |
References | () http://www.debian.org/security/2006/dsa-1164 - Broken Link | |
References | () http://www.mandriva.com/security/advisories?name=MDKSA-2006:156 - Broken Link | |
References | () http://www.novell.com/linux/security/advisories/2006_21_sr.html - Broken Link | |
References | () http://www.openbsd.org/errata.html#sendmail3 - Release Notes | |
References | () http://www.openbsd.org/errata38.html#sendmail3 - Third Party Advisory | |
References | () http://www.osvdb.org/28193 - Broken Link | |
References | () http://www.securityfocus.com/bid/19714 - Broken Link, Patch, Third Party Advisory, VDB Entry | |
References | () http://www.sendmail.org/releases/8.13.8.html - Release Notes | |
References | () http://www.vupen.com/english/advisories/2006/3393 - Broken Link, Vendor Advisory | |
References | () http://www.vupen.com/english/advisories/2006/3994 - Broken Link, Vendor Advisory | |
CPE | cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.13.6:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:4.55:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.13.7:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:4.1:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:* cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:* |
cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:* |
Information
Published : 2006-08-29 00:04
Updated : 2024-11-21 00:15
NVD link : CVE-2006-4434
Mitre link : CVE-2006-4434
CVE.ORG link : CVE-2006-4434
JSON object : View
Products Affected
sendmail
- sendmail
CWE
CWE-416
Use After Free