Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2003-0161

10 documents9 sources
Severity
10.0CRITICAL
EPSS
67.9%
top 1.41%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedApr 2
Latest updateMay 3

Description

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.

CVSS vector

AV:N/AC:L/C:C/I:C/A:CExploitability: 10.0 | Impact: 10.0

Affected Packages9 packages

Debiansendmail< 8.12.9-1+3
NVDsendmail/sendmail31 versions+30
NVDsendmail/sendmail_switch16 versions+15
NVDhp/hp-ux16 versions+15
NVDsun/sunos5 versions+4

Patches

🔴Vulnerability Details

3
GHSA
GHSA-2259-4w76-9w2p: The prescan() function in the address parser (parseaddr2022-05-03
OSV
CVE-2003-0161: The prescan() function in the address parser (parseaddr2003-04-02
CVEList
CVE-2003-0161: The prescan() function in the address parser (parseaddr2003-04-01

💥Exploits & PoCs

2
Exploit-DB
Sendmail 8.12.8 (BSD) - 'Prescan()' Remote Command Execution2003-04-30
Exploit-DB
Sendmail 8.11.6 - Address Prescan Memory Corruption2003-03-29

🔍Detection Rules

1
Suricata
GPL SMTP EXPN overflow attempt2010-09-23

📋Vendor Advisories

2
Red Hat
security flaw2003-03-29
Debian
CVE-2003-0161: sendmail - The prescan() function in the address parser (parseaddr.c) in Sendmail before 8....2003

💬Community

1
Bugzilla
CVE-2003-0161 security flaw2018-08-16
CVE-2003-0161 (CRITICAL CVSS 10) | The prescan() function in the addre | cvebase.io