CVE-2006-4434

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."

References

http://secunia.com/advisories/21637

http://secunia.com/advisories/21641

http://secunia.com/advisories/21696

http://secunia.com/advisories/21700

http://secunia.com/advisories/21749

http://secunia.com/advisories/22369

http://securitytracker.com/id?1016753

http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1

http://www.attrition.org/pipermail/vim/2006-August/000999.html

http://www.debian.org/security/2006/dsa-1164

http://www.mandriva.com/security/advisories?name=MDKSA-2006:156

http://www.novell.com/linux/security/advisories/2006_21_sr.html

http://www.openbsd.org/errata.html#sendmail3

http://www.openbsd.org/errata38.html#sendmail3

http://www.osvdb.org/28193

http://www.securityfocus.com/bid/19714

http://www.sendmail.org/releases/8.13.8.html

http://www.vupen.com/english/advisories/2006/3393

http://www.vupen.com/english/advisories/2006/3994

Details

Source: MITRE

Published: 2006-08-29

Updated: 2011-03-10

Type: CWE-399

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:sendmail:sendmail:4.1:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:4.55:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:5.59:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:5.61:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:5.65:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.13.6:*:*:*:*:*:*:*

cpe:2.3:a:sendmail:sendmail:8.13.7:*:*:*:*:*:*:*

Tenable Plugins

View all (12 total)

IDNameProductFamilySeverity
107916Solaris 10 (x86) : 125012-01NessusSolaris Local Security Checks
medium
107413Solaris 10 (sparc) : 125011-01NessusSolaris Local Security Checks
medium
17724Sendmail < 8.13.8 Header Processing Overflow DoSNessusSMTP problems
medium
41098SuSE9 Security Update : sendmail (YOU Patch Number 11200)NessusSuSE Local Security Checks
medium
29579SuSE 10 Security Update : sendmail (ZYPP Patch Number 2030)NessusSuSE Local Security Checks
medium
27446openSUSE 10 Security Update : sendmail (sendmail-2027)NessusSuSE Local Security Checks
medium
24392Solaris 10 (x86) : 125012-01NessusSolaris Local Security Checks
medium
24380Solaris 10 (sparc) : 125011-01NessusSolaris Local Security Checks
medium
23900Mandrake Linux Security Advisory : sendmail (MDKSA-2006:156)NessusMandriva Local Security Checks
medium
22706Debian DSA-1164-1 : sendmail - programming errorNessusDebian Local Security Checks
medium
13592Solaris 9 (x86) : 114137-10NessusSolaris Local Security Checks
high
13541Solaris 9 (sparc) : 113575-11NessusSolaris Local Security Checks
high