Product:

Sendmail_switch

(Sendmail)
Repositories

Unknown:

This might be proprietary software.

#Vulnerabilities 3
Date Id Summary Products Score Patch Annotated
2003-10-06 CVE-2003-0694 The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. Mac_os_x, Mac_os_x_server, Tru64, Freebsd, Linux, Hp\-Ux, Aix, Netbsd, Advanced_message_server, Sendmail, Sendmail_pro, Sendmail_switch, Irix, Solaris, Sunos, Turbolinux_advanced_server, Turbolinux_server, Turbolinux_workstation N/A
2003-10-06 CVE-2003-0681 A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences. Mac_os_x, Mac_os_x_server, Linux, Hp\-Ux, Aix, Netbsd, Openbsd, Advanced_message_server, Sendmail, Sendmail_pro, Sendmail_switch, Turbolinux_advanced_server, Turbolinux_server, Turbolinux_workstation N/A
2003-04-02 CVE-2003-0161 The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337. Tru64, Hp\-Ux, Hp\-Ux_series_700, Hp\-Ux_series_800, Sis, Sendmail, Sendmail_switch, Solaris, Sunos N/A