CVE-1999-0131
Published Sep 11, 1996
Last updated 16 years ago
Overview
- Description
- Buffer overflow and denial of service in Sendmail 8.7.5 and earlier through GECOS field gives root access to local users.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.2
- Impact score
- 10
- Exploitability score
- 3.9
- Vector string
- AV:L/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- NVD-CWE-Other
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:eric_allman:sendmail:8.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9413566A-425B-4684-A332-A9DD3309FB51" }, { "criteria": "cpe:2.3:a:eric_allman:sendmail:8.7.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C2D488B8-49D0-4AFD-A5C1-63CB036E3886" }, { "criteria": "cpe:2.3:a:eric_allman:sendmail:8.7.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A3E2EE58-BCAD-4F26-94B6-F91CF1731429" }, { "criteria": "cpe:2.3:a:eric_allman:sendmail:8.7.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "10AC2FAD-C4AD-46DD-88D1-4F99433B3476" }, { "criteria": "cpe:2.3:a:eric_allman:sendmail:8.7.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B730F70-5662-4BE4-8202-93E12620CBD2" }, { "criteria": "cpe:2.3:a:eric_allman:sendmail:8.7.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FA6D5E9F-275F-41EB-9707-6B7F129A700F" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:bsdi:bsd_os:2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "766851E2-134A-4A89-931B-6F1753525684" }, { "criteria": "cpe:2.3:o:digital:osf_1:1.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "44C3AF89-3854-4F37-807E-74FC0640693B" }, { "criteria": "cpe:2.3:o:freebsd:freebsd:2.1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4054D69F-596F-4EB4-BE9A-E2478343F55A" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "53BBFE9A-6846-4625-91AC-47AA0BC0933A" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F" }, { "criteria": "cpe:2.3:o:ibm:aix:3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DD5E0678-45C7-492A-963C-897494D6878F" }, { "criteria": "cpe:2.3:o:ibm:aix:4.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FBF25306-E7C2-4F9A-A809-4779A6C0A079" }, { "criteria": "cpe:2.3:o:ibm:aix:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "05F20EC2-ADE6-4F96-A2E7-1DCCA819D657" }, { "criteria": "cpe:2.3:o:redhat:linux:3.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "445EECD3-2DB9-43D1-B26F-0979A3C02D45" }, { "criteria": "cpe:2.3:o:sco:internet_faststart:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "61FEF2E3-1939-42B3-B32F-A22C173A186A" }, { "criteria": "cpe:2.3:o:sco:openserver:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2C19F7B3-9043-4E53-90DE-92A4387858A7" }, { "criteria": "cpe:2.3:o:sco:openserver:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0169CBF5-9301-42D2-A6DA-73393BD986D8" } ], "operator": "OR" } ] } ]