CVE-2002-1337
Published Mar 7, 2003
Last updated 9 months ago
Overview
- Description
- Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
- Source
- cve@mitre.org
- NVD status
- Analyzed
Social media
- Hype score
- Not currently trending
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 10
- Impact score
- 10
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:C/I:C/A:C
Weaknesses
- nvd@nist.gov
- CWE-120
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C6D3A2C0-B076-4351-8085-DA3A37117453", "versionEndExcluding": "8.9.3" }, { "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5AE239ED-94EE-40C7-9133-D1F4779A2E0C", "versionEndExcluding": "8.11.6", "versionStartIncluding": "8.10.0" }, { "criteria": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "64788C22-64F9-41DB-A4C2-BFCD6DBD8EE6", "versionEndExcluding": "8.12.8", "versionStartIncluding": "8.12.0" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5556D665-3792-4832-9EEE-D1122C9BF98E" }, { "criteria": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D1FD0EB4-E744-4465-AFEE-A3C807C9C993" }, { "criteria": "cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1D866A7D-F0B9-4EA3-93C6-1E7C2C2A861F" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "38BFA923-7D80-4F01-AF9F-6F13209948AC" }, { "criteria": "cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDE44C49-172C-4899-8CC8-29AA99A7CD2F" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "771931F7-9180-4EBD-8627-E1CF17D24647" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3DB008E3-9A00-4D28-8826-A9FCC9F65314" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EDD9BE2B-7255-4FC1-B452-E8370632B03F" }, { "criteria": "cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EBD0DC0A-ACAD-4870-9C0F-3095F2AC8CCD" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "E10D9BF9-FCC7-4680-AD3A-95757FC005EA" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "78E8C3A4-9FA7-4F2A-8C65-D4404715E674" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "DBA2E3A3-EB9B-4B20-B754-EEC914FB1D47" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7AC78BA4-70F4-4B9F-93C2-B107E4DCC418" }, { "criteria": "cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "28A10F5A-067E-4DD8-B585-ABCD6F6B324E" }, { "criteria": "cpe:2.3:o:oracle:solaris:2.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "69C7B4A8-E8D0-425C-B979-17E85458B0C6" }, { "criteria": "cpe:2.3:o:oracle:solaris:7.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "0F538D2B-1AE1-4766-830E-CF7999181128" }, { "criteria": "cpe:2.3:o:oracle:solaris:8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "722A52CF-4C6E-44D3-90C4-D2F72A40EF58" }, { "criteria": "cpe:2.3:o:oracle:solaris:9:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4F864AD7-53A2-4225-870F-062876CE45DD" }, { "criteria": "cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "369207B4-96FA-4324-9445-98FAE8ECF5DB" }, { "criteria": "cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "08003947-A4F1-44AC-84C6-9F8D097EB759" }, { "criteria": "cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "A2475113-CFE4-41C8-A86F-F2DA6548D224" }, { "criteria": "cpe:2.3:o:windriver:bsdos:4.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "18B197B3-AA07-440F-A733-80B7CE07B3D2" }, { "criteria": "cpe:2.3:o:windriver:bsdos:4.3.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42761237-75A9-4E8C-8202-3CA3EB3D1ACC" }, { "criteria": "cpe:2.3:o:windriver:bsdos:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7FAFD2BC-330C-4357-B8C7-F451C6282869" }, { "criteria": "cpe:2.3:o:windriver:platform_sa:1.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "2151D858-F6D4-472E-9CC7-A8EA26E27CC7" } ], "operator": "OR" } ] } ]