Sendmail headers.c crackaddr Function Address Field Handling Remote Overflow

Critical Nessus Plugin ID 11316


The remote host has an application that is affected by a buffer overflow vulnerability.


The remote sendmail server, according to its version number, may be affected by a remote buffer overflow allowing remote users to gain root privileges.

Sendmail versions from 5.79 to 8.12.7 are affected.

*** Nessus reports this vulnerability using only
*** the banner of the remote SMTP server. Therefore,
*** this might be a false positive.


Upgrade to Sendmail ver 8.12.8 or later. If you cannot upgrade, apply patches for 8.10-12 here :

NOTE: manual patches do not change the version numbers.
Vendors who have released patched versions of sendmail may still falsely show vulnerability.

Plugin Details

Severity: Critical

ID: 11316

File Name: sendmail_header.nasl

Version: $Revision: 1.37 $

Type: remote

Published: 2003/03/03

Modified: 2017/04/27

Dependencies: 10263, 13454, 12869, 13592, 13121, 13541, 13350, 13225, 12981

Risk Information

Risk Factor: Critical


Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:sendmail:sendmail

Required KB Items: SMTP/sendmail

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2003/03/04

Reference Information

CVE: CVE-2002-1337

BID: 6991

OSVDB: 4502

CERT-CC: CA-2003-07

CERT: 398025