Bug 86604 - New sendmail root exploit
New sendmail root exploit
Product: Red Hat Enterprise Linux 2.1
Classification: Red Hat
Component: sendmail (Show other bugs)
All Linux
medium Severity medium
: ---
: ---
Assigned To: Florian La Roche
David Lawrence
: Security
Depends On:
  Show dependency treegraph
Reported: 2003-03-26 06:08 EST by Mark J. Cox (Product Security)
Modified: 2007-11-30 17:06 EST (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2003-04-01 02:49:11 EST
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)

  None (edit)
Description Mark J. Cox (Product Security) 2003-03-26 06:08:29 EST
There is a vulnerability in Sendmail versions 8.12.8 and prior. The
address parser performs insufficient bounds checking in certain conditions
due to a char to int conversion, making it possible for an attacker to
take control of the application. Although no exploit currently exists,
this issue is probably locally exploitable and may be remotely exploitable.

Not public before April 14
Comment 1 Mark J. Cox (Product Security) 2003-03-30 04:43:46 EST
Just to update bug, became public on Mar30 through full-disclosure list
Comment 2 Mark J. Cox (Product Security) 2003-04-01 02:49:11 EST
Fixed by RHSA-2003:121

Note You need to log in before you can comment on or make changes to this bug.