Sendmail < 8.12.9 NOCHAR Control Value prescan Overflow

Critical Nessus Plugin ID 11499


Arbitrary code may be run on the remote server


The remote Sendmail server, according to its version number, may be vulnerable to a remote buffer overflow allowing remote users to gain root privileges.

Sendmail versions from 5.79 to 8.12.8 are vulnerable.

NOTE: manual patches do not change the version numbers.
Vendors who have released patched versions of Sendmail may still falsely show a vulnerability.

*** Nessus reports this vulnerability using only the banner of the
*** remote SMTP server. Therefore, this might be a false positive.


Upgrade to Sendmail version 8.12.9 or greater.

See Also

Plugin Details

Severity: Critical

ID: 11499

File Name: sendmail_conversion_overflow.nasl

Version: 1.33

Type: remote

Published: 2003/03/29

Updated: 2018/09/17

Dependencies: 111549

Risk Information

Risk Factor: Critical

CVSS Score Source: CVE-2003-0161

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

CVSS v3.0

Base Score: 9.8

Temporal Score: 8.8

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

Temporal Vector: CVSS:3.0/E:P/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:sendmail:sendmail

Required KB Items: installed_sw/Sendmail

Exploit Available: true

Exploit Ease: Exploits are available

Vulnerability Publication Date: 2003/03/29

Reference Information

CVE: CVE-2003-0161

BID: 7230