Sendmail < 8.12.9 NOCHAR Control Value prescan Overflow

critical Nessus Plugin ID 11499



Arbitrary code may be run on the remote server


The remote Sendmail server, according to its version number, may be vulnerable to a remote buffer overflow allowing remote users to gain root privileges.

Sendmail versions from 5.79 to 8.12.8 are vulnerable.

NOTE: manual patches do not change the version numbers.
Vendors who have released patched versions of Sendmail may still falsely show a vulnerability.

*** Nessus reports this vulnerability using only the banner of the
*** remote SMTP server. Therefore, this might be a false positive.


Upgrade to Sendmail version 8.12.9 or greater.

See Also

Plugin Details

Severity: Critical

ID: 11499

File Name: sendmail_conversion_overflow.nasl

Version: 1.33

Type: remote

Published: 3/29/2003

Updated: 9/17/2018

Supported Sensors: Nessus

Risk Information


Risk Factor: Medium

Score: 6.7


Risk Factor: Critical

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

CVSS Score Source: CVE-2003-0161


Risk Factor: Critical

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:sendmail:sendmail

Required KB Items: installed_sw/Sendmail

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 3/29/2003

Reference Information

CVE: CVE-2003-0161

BID: 7230