CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2006-0058

Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
Publish Date : 2006-03-22 Last Update Date : 2017-10-10
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
7.6
Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)
Integrity Impact Complete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)
Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)
Access Complexity High (Specialized access conditions exist. It is hard to exploit and several special conditions must be satisfied to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access Admin
Vulnerability Type(s) Execute Code
CWE ID CWE id is not defined for this vulnerability

- Additional Vendor Supplied Data

Vendor Impact CVSS Score CVSS Vector Report Date Publish Date
Redhat critical 2006-03-08 2006-03-22
If you are a vendor and you have additional data which can be automatically imported into our database, please contact admin @ cvedetails.com

- Related OVAL Definitions

Title Definition Id Class Family
CVE-2006-0058 oval:org.opensuse.security:def:20060058 unix
RHSA-2006:0264: sendmail security update (Critical) oval:com.redhat.rhsa:def:20060264 unix
Sendmail setjmp longjmp bo (Red Hat Internal) oval:org.mitre.oval:def:1689 unix
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by trig... oval:org.mitre.oval:def:11074 unix
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability.

- Products Affected By CVE-2006-0058

# Product Type Vendor Product Version Update Edition Language
1 Application Sendmail Sendmail 8.13.0 Version Details Vulnerabilities
2 Application Sendmail Sendmail 8.13.1 Version Details Vulnerabilities
3 Application Sendmail Sendmail 8.13.2 Version Details Vulnerabilities
4 Application Sendmail Sendmail 8.13.3 Version Details Vulnerabilities
5 Application Sendmail Sendmail 8.13.4 Version Details Vulnerabilities
6 Application Sendmail Sendmail 8.13.5 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Sendmail Sendmail 6

- References For CVE-2006-0058

http://www.vupen.com/english/advisories/2006/2490
VUPEN ADV-2006-2490
http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688 CONFIRM
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751 CONFIRM
https://exchange.xforce.ibmcloud.com/vulnerabilities/24584
XF smtp-timeout-bo(24584)
http://www.vupen.com/english/advisories/2006/2189
VUPEN ADV-2006-2189
http://www.vupen.com/english/advisories/2006/1529
VUPEN ADV-2006-1529
http://www.vupen.com/english/advisories/2006/1157
VUPEN ADV-2006-1157
http://www.vupen.com/english/advisories/2006/1139
VUPEN ADV-2006-1139
http://www.vupen.com/english/advisories/2006/1072
VUPEN ADV-2006-1072
http://www.vupen.com/english/advisories/2006/1068
VUPEN ADV-2006-1068
http://www.securityfocus.com/bid/17192
BID 17192 Sendmail Asynchronous Signal Handling Remote Code Execution Vulnerability Release Date:2007-09-22
http://www.sendmail.com/company/advisory/index.shtml CONFIRM
http://www.us-cert.gov/cas/techalerts/TA06-081A.html
CERT TA06-081A
http://www.vupen.com/english/advisories/2006/1049
VUPEN ADV-2006-1049
http://www.vupen.com/english/advisories/2006/1051
VUPEN ADV-2006-1051
http://www.securityfocus.com/archive/1/archive/1/428656/100/0/threaded
FEDORA FLSA:186277
http://www.securityfocus.com/archive/1/428536/100/0/threaded
BUGTRAQ 20060322 sendmail vuln advisories (CVE-2006-0058)
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00018.html
FEDORA FEDORA-2006-193
http://www.redhat.com/support/errata/RHSA-2006-0265.html
REDHAT RHSA-2006:0265
http://www.redhat.com/support/errata/RHSA-2006-0264.html
REDHAT RHSA-2006:0264
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82993&apar=only
AIXAPAR IY82993
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82994&apar=only
AIXAPAR IY82994
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00017.html
FEDORA FEDORA-2006-194
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.007-sendmail.html
OPENPKG OpenPKG-SA-2006.007
http://www.openbsd.org/errata38.html#sendmail
OPENBSD [3.8] 006: SECURITY FIX: March 25, 2006
http://www.novell.com/linux/security/advisories/2006_17_sendmail.html
SUSE SUSE-SA:2006:017
http://www.mandriva.com/security/advisories?name=MDKSA-2006:058
MANDRIVA MDKSA-2006:058
http://www.kb.cert.org/vuls/id/834865
CERT-VN VU#834865
http://www.iss.net/threats/216.html
ISS 20060322 Sendmail Remote Signal Handling Vulnerability
http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml
GENTOO GLSA-200603-21
http://www.f-secure.com/security/fsc-2006-2.shtml CONFIRM
http://www.debian.org/security/2006/dsa-1015
DEBIAN DSA-1015
http://www.ciac.org/ciac/bulletins/q-151.shtml
CIAC Q-151
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82992&apar=only
AIXAPAR IY82992
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200494-1
SUNALERT 200494
http://support.avaya.com/elmodocs2/security/ASA-2006-074.htm CONFIRM
http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm CONFIRM
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102324-1
SUNALERT 102324
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102262-1
SUNALERT 102262
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.619600
SLACKWARE SSA:2006-081-01
http://securitytracker.com/id?1015801
SECTRACK 1015801
http://securityreason.com/securityalert/743
SREASON 743
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635
HP HPSBTU02116
http://securityreason.com/securityalert/612
SREASON 612
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
SGI 20060401-01-U
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00629555
HP HPSBUX02108
ftp://patches.sgi.com/support/free/security/advisories/20060302-01-P
SGI 20060302-01-P
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-010.txt.asc
NETBSD NetBSD-SA2006-010
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.24/SCOSA-2006.24.txt
SCO SCOSA-2006.24
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc
FREEBSD FreeBSD-SA-06:13

- Metasploit Modules Related To CVE-2006-0058

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.