Search for vulnerabilities
Vulnerability ID | VCID-c3nq-8sr3-aaap |
Aliases |
CVE-2003-0694
|
Summary | The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c. |
Status | Published |
Exploitability | 2.0 |
Weighted Severity | 9.0 |
Risk | 10.0 |
Affected and Fixed Packages | Package Details |
There are no known CWE. |
Data source | Metasploit |
---|---|
Description | This is a proof of concept denial of service module for Sendmail versions 8.12.8 and earlier. The vulnerability is within the prescan() method when parsing SMTP headers. Due to the prescan function, only 0x5c and 0x00 bytes can be used, limiting the likelihood for arbitrary code execution. |
Note | AKA: - EARLYSHOVEL Stability: - crash-service-down SideEffects: [] Reliability: [] |
Ransomware campaign use | Unknown |
Source publication date | Sept. 17, 2003 |
Source URL | https://github.com/rapid7/metasploit-framework/tree/master/modules/auxiliary/dos/smtp/sendmail_prescan.rb |
Exploitability (E) | Access Vector (AV) | Access Complexity (AC) | Authentication (Au) | Confidentiality Impact (C) | Integrity Impact (I) | Availability Impact (A) |
---|---|---|---|---|---|---|
high functional unproven proof_of_concept not_defined |
local adjacent_network network |
high medium low |
multiple single none |
none partial complete |
none partial complete |
none partial complete |
Percentile | 0.93223 |
EPSS Score | 0.05221 |
Published At | Nov. 1, 2024, midnight |
Date | Actor | Action | Source | VulnerableCode Version |
---|---|---|---|---|
There are no relevant records. |