Debian DSA-290-1 : sendmail-wide - char-to-int conversion

Critical Nessus Plugin ID 15127


The remote Debian host is missing a security-related update.


Michal Zalewski discovered a buffer overflow, triggered by a char to int conversion, in the address parsing code in sendmail, a widely used powerful, efficient, and scalable mail transport agent. This problem is potentially remotely exploitable.


Upgrade the sendmail-wide packages.

For the stable distribution (woody) this problem has been fixed in version 8.12.3+3.5Wbeta-5.4

For the old stable distribution (potato) this problem has been fixed in version 8.9.3+3.2W-25

See Also

Plugin Details

Severity: Critical

ID: 15127

File Name: debian_DSA-290.nasl

Version: 1.25

Type: local

Agent: unix

Published: 2004/09/29

Updated: 2019/08/02

Dependencies: 12634

Risk Information

Risk Factor: Critical

CVSS v2.0

Base Score: 10

Temporal Score: 7.8

Vector: CVSS2#AV:N/AC:L/Au:N/C:C/I:C/A:C

Temporal Vector: CVSS2#E:POC/RL:OF/RC:C

Vulnerability Information

CPE: p-cpe:/a:debian:debian_linux:sendmail-wide, cpe:/o:debian:debian_linux:2.2, cpe:/o:debian:debian_linux:3.0

Required KB Items: Host/local_checks_enabled, Host/Debian/release, Host/Debian/dpkg-l

Exploit Available: true

Exploit Ease: Exploits are available

Patch Publication Date: 2003/04/17

Vulnerability Publication Date: 2003/03/29

Reference Information

CVE: CVE-2003-0161

BID: 7230

CERT: 897604

DSA: 290