CVE-2002-1337

Scores

EPSS

0.539medium53.9%
0%20%40%60%80%100%

Percentile: 53.9%

CVSS

10.0critical2.0
0246810

CVSS Score: 10.0/10

All CVSS Scores

CVSS 2.0
10.0

Vector: AV:N/AC:L/Au:N/C:C/I:C/A:C

Description

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvd

CWEs

CWE-120

Exploits

Exploit ID: 22313

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22313

Exploit ID: 22314

Source: exploitdb

URL: https://www.exploit-db.com/exploits/22314

Exploit ID: 411

Source: exploitdb

URL: https://www.exploit-db.com/exploits/411

Vulnerable Software (11)

Type: Configuration

Product: sendmail

Operating System: debian

Trait:
{  "fixed": "8.13.0.PreAlpha4-0"}

Source: debian

Type: Configuration

Product: sendmail-wine

Operating System: debian

Trait:
{  "unfixed": true}

Source: debian

Type: Configuration

Vendor: *

Product: alphaserver_sc

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",      "v...

Source: nvd

Type: Configuration

Vendor: *

Product: bsdos

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",      "v...

Source: nvd

Type: Configuration

Vendor: *

Product: hp-ux

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",      "v...

Source: nvd

Type: Configuration

Vendor: *

Product: linux_distro

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",      "v...

Source: nvd

Type: Configuration

Vendor: *

Product: netbsd

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",      "v...

Source: nvd

Type: Configuration

Vendor: *

Product: platform_sa

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",      "v...

Source: nvd

Type: Configuration

Vendor: *

Product: sendmail

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*",      "versionEndExcluding": "8.9.3",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:a:sendm...

Source: nvd

Type: Configuration

Vendor: *

Product: solaris

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",      "v...

Source: nvd

Type: Configuration

Vendor: *

Product: sunos

Operating System: * * *

Trait:
{  "cpe_match": [    {      "cpe23uri": "cpe:2.3:h:hp:alphaserver_sc:*:*:*:*:*:*:*:*",      "vulnerable": true    },    {      "cpe23uri": "cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*",      "v...

Source: nvd

End of list