Sendmail vulnerabilities

33 known vulnerabilities affecting sendmail/sendmail.

Total CVEs
33
CISA KEV
0
Public exploits
9
Exploited in wild
0
Severity breakdown
CRITICAL3HIGH13MEDIUM12LOW5

Vulnerabilities

Page 1 of 2
CVE-2023-51765MEDIUMCVSS 5.3fixed in 8.18.0.22023-12-24
CVE-2023-51765 [MEDIUM] CWE-345 CVE-2023-51765: sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports . but some other popular e-mail servers do not. This is resolved in 8.18
nvd
CVE-2021-3618HIGHCVSS 7.4fixed in 8.172022-03-23
CVE-2021-3618 [HIGH] CWE-295 CVE-2021-3618: ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementin ALPACA is an application layer protocol content confusion attack, exploiting TLS servers implementing different protocols but using compatible certificates, such as multi-domain or wildcard certificates. A MiTM attacker having access to victim's traffic at the TCP/IP layer can redirect traffic from one subdomain to another, resulting in a valid TLS sess
nvd
CVE-2014-3956LOWCVSS 1.9≤ 8.14.8v8.6.7+51 more2014-06-04
CVE-2014-3956 [LOW] CWE-200 CVE-2014-3956: The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.
nvd
CVE-2009-4565HIGHCVSS 7.5≤ 8.14.3v2.6+56 more2010-01-04
CVE-2009-4565 [HIGH] CVE-2009-4565: sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a
nvd
CVE-2009-1490MEDIUMCVSS 5.0PoC≤ 8.13.1.2v2.6+49 more2009-05-05
CVE-2009-1490 [MEDIUM] CWE-119 CVE-2009-1490: Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of se Heap-based buffer overflow in Sendmail before 8.13.2 allows remote attackers to cause a denial of service (daemon crash) and possibly execute arbitrary code via a long X- header, as demonstrated by an X-Testing header.
nvd
CVE-2007-2246HIGHCVSS 7.8v8.9.3v8.11.12007-04-25
CVE-2007-2246 [HIGH] CVE-2007-2246: Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and H Unspecified vulnerability in HP-UX B.11.00 and B.11.11, when running sendmail 8.9.3 or 8.11.1; and HP-UX B.11.23 when running sendmail 8.11.1; allows remote attackers to cause a denial of service via unknown attack vectors. NOTE: due to the lack of details from HP, it is not known whether this issue is a duplicate of another CVE such as CVE-2006-1173 or CVE-200
nvd
CVE-2006-7175HIGHCVSS 7.5v8.13.1.22007-03-27
CVE-2006-7175 [HIGH] CVE-2006-7175: The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow t The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not allow the administrator to disable SSLv2 encryption, which could cause less secure channels to be used than desired.
nvd
CVE-2006-7176MEDIUMCVSS 4.3v8.13.1.22007-03-27
CVE-2006-7176 [MEDIUM] CVE-2006-7176: The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject The version of Sendmail 8.13.1-2 on Red Hat Enterprise Linux 4 Update 4 and earlier does not reject the "localhost.localdomain" domain name for e-mail messages that come from external hosts, which might allow remote attackers to spoof messages.
nvd
CVE-2006-4434HIGHCVSS 7.5fixed in 8.13.82006-08-29
CVE-2006-4434 [HIGH] CWE-416 CVE-2006-4434: Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with
nvd
CVE-2006-1173MEDIUMCVSS 5.0≤ 8.13.6v8.8.8+35 more2006-06-07
CVE-2006-1173 [MEDIUM] CWE-399 CVE-2006-1173: Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malfo Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
nvd
CVE-2006-0058HIGHCVSS 7.6PoCv8.13.0v8.13.1+4 more2006-03-22
CVE-2006-0058 [HIGH] CVE-2006-0058: Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute ar Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
nvd
CVE-2005-2070MEDIUMCVSS 5.0v8.8.8v8.9.0+27 more2005-06-29
CVE-2005-2070 [MEDIUM] CVE-2005-2070: The ClamAV Mail fILTER (clamav-milter) 0.84 through 0.85d, when used in Sendmail using long timeouts The ClamAV Mail fILTER (clamav-milter) 0.84 through 0.85d, when used in Sendmail using long timeouts, allows remote attackers to cause a denial of service by keeping an open connection, which prevents ClamAV from reloading.
nvd
CVE-2003-0688MEDIUMCVSS 5.0v8.12.1v8.12.2+6 more2003-10-20
CVE-2003-0688 [MEDIUM] CVE-2003-0688: The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properl The DNS map code in Sendmail 8.12.8 and earlier, when using the "enhdnsbl" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data.
nvd
CVE-2003-0694CRITICALCVSS 10.0v2.6v2.6.1+31 more2003-10-06
CVE-2003-0694 [CRITICAL] CVE-2003-0694: The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
nvd
CVE-2003-0681HIGHCVSS 7.5PoCv2.6v2.6.1+31 more2003-10-06
CVE-2003-0681 [HIGH] CVE-2003-0681: A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rul A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
nvd
CVE-2003-0308HIGHCVSS 7.2v8.9.3v8.12.3+1 more2003-05-15
CVE-2003-0308 [HIGH] CVE-2003-0308: The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which The Sendmail 8.12.3 package in Debian GNU/Linux 3.0 does not securely create temporary files, which could allow local users to gain additional privileges via (1) expn, (2) checksendmail, or (3) doublebounce.pl.
nvd
CVE-2003-0161CRITICALCVSS 10.0PoCv2.6v2.6.1+29 more2003-04-02
CVE-2003-0161 [CRITICAL] CVE-2003-0161: The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not proper The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary
nvd
CVE-2002-1337CRITICALCVSS 10.0PoCfixed in 8.9.3≥ 8.10.0, < 8.11.6+1 more2003-03-07
CVE-2002-1337 [CRITICAL] CWE-120 CVE-2002-1337: Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via cer Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
nvd
CVE-2002-2261HIGHCVSS 7.5v8.9.0v8.9.1+22 more2002-12-31
CVE-2002-2261 [HIGH] CWE-264 CVE-2002-2261: Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by th Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
nvd
CVE-2002-2423MEDIUMCVSS 6.4v8.12.0v8.12.1+5 more2002-12-31
CVE-2002-2423 [MEDIUM] CWE-20 CVE-2002-2423: Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remot Sendmail 8.12.0 through 8.12.6 truncates log messages longer than 100 characters, which allows remote attackers to prevent the IP address from being logged via a long IDENT response.
nvd