CVEdetails.com the ultimate security vulnerability data source
(e.g.: CVE-2009-1234 or 2010-1234 or 20101234)
Log In   Register
Vulnerability Feeds & WidgetsNew   www.itsecdb.com  

Vulnerability Details : CVE-2006-0058

Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.
Publish Date : 2006-03-22 Last Update Date : 2010-12-14
Search Twitter   Search YouTube   Search Google

- CVSS Scores & Vulnerability Types

CVSS Score
7.6
Confidentiality Impact Complete (There is total information disclosure, resulting in all system files being revealed.)
Integrity Impact Complete (There is a total compromise of system integrity. There is a complete loss of system protection, resulting in the entire system being compromised.)
Availability Impact Complete (There is a total shutdown of the affected resource. The attacker can render the resource completely unavailable.)
Access Complexity High (Specialized access conditions exist. It is hard to exploit and several special conditions must be satisfied to exploit)
Authentication Not required (Authentication is not required to exploit the vulnerability.)
Gained Access Admin
Vulnerability Type(s) Execute Code
CWE ID CWE id is not defined for this vulnerability

- Additional Vendor Supplied Data

Vendor Impact CVSS Score CVSS Vector Report Date Publish Date
Redhat critical 2006-03-08 2006-03-22
If you are a vendor and you have additional data which can be automatically imported into our database, please contact admin @ cvedetails.com

- Related OVAL Definitions

Title Definition Id Class Family
CVE-2006-0058 oval:org.opensuse.security:def:20060058 unix
RHSA-2006:0264: sendmail security update (Critical) oval:com.redhat.rhsa:def:20060264 unix
Sendmail setjmp longjmp bo (Red Hat Internal) oval:org.mitre.oval:def:1689 unix
Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by trig... oval:org.mitre.oval:def:11074 unix
OVAL (Open Vulnerability and Assessment Language) definitions define exactly what should be done to verify a vulnerability or a missing patch. Check out the OVAL definitions if you want to learn what you should do to verify a vulnerability.

- Products Affected By CVE-2006-0058

# Product Type Vendor Product Version Update Edition Language
1 Application Sendmail Sendmail 8.13.0 Version Details Vulnerabilities
2 Application Sendmail Sendmail 8.13.1 Version Details Vulnerabilities
3 Application Sendmail Sendmail 8.13.2 Version Details Vulnerabilities
4 Application Sendmail Sendmail 8.13.3 Version Details Vulnerabilities
5 Application Sendmail Sendmail 8.13.4 Version Details Vulnerabilities
6 Application Sendmail Sendmail 8.13.5 Version Details Vulnerabilities

- Number Of Affected Versions By Product

Vendor Product Vulnerable Versions
Sendmail Sendmail 6

- References For CVE-2006-0058

ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:13.sendmail.asc
FREEBSD FreeBSD-SA-06:13
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635
HP HPSBTU02116
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?lang=en&cc=us&objectID=c00629555
HP SSRT061133
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2006-010.txt.asc
NETBSD NetBSD-SA2006-010
ftp://ftp.sco.com/pub/updates/UnixWare/SCOSA-2006.24/SCOSA-2006.24.txt
SCO SCOSA-2006.24
ftp://patches.sgi.com/support/free/security/advisories/20060302-01-P
SGI 20060302-01-P
ftp://patches.sgi.com/support/free/security/advisories/20060401-01-U
SGI 20060401-01-U
http://secunia.com/advisories/19345
SECUNIA 19345
http://secunia.com/advisories/19346
SECUNIA 19346
http://secunia.com/advisories/19349
SECUNIA 19349
http://secunia.com/advisories/19360
SECUNIA 19360
http://secunia.com/advisories/19356
SECUNIA 19356
http://secunia.com/advisories/19361
SECUNIA 19361
http://secunia.com/advisories/19368
SECUNIA 19368
http://secunia.com/advisories/19394
SECUNIA 19394
http://secunia.com/advisories/19404
SECUNIA 19404
http://secunia.com/advisories/19407
SECUNIA 19407
http://secunia.com/advisories/19450
SECUNIA 19450
http://secunia.com/advisories/19466
SECUNIA 19466
http://secunia.com/advisories/19532
SECUNIA 19532
http://secunia.com/advisories/19533
SECUNIA 19533
http://secunia.com/advisories/19676
SECUNIA 19676
http://secunia.com/advisories/19774
SECUNIA 19774
http://secunia.com/advisories/20243
SECUNIA 20243
http://secunia.com/advisories/20723
SECUNIA 20723
http://securityreason.com/securityalert/612
SREASON 612
http://securityreason.com/securityalert/743
SREASON 743
http://securitytracker.com/id?1015801
SECTRACK 1015801
http://www.securityfocus.com/bid/17192
BID 17192 Sendmail Asynchronous Signal Handling Remote Code Execution Vulnerability Release Date:2007-09-22
http://www.securityfocus.com/archive/1/archive/1/428656/100/0/threaded
FEDORA FLSA:186277
http://www14.software.ibm.com/webapp/set2/sas/f/hmc/power5/install/v52.Readme.html#MH00688 CONFIRM
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.619600
SLACKWARE SSA:2006-081-01
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102324-1
SUNALERT 102324
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102262-1
SUNALERT 102262
http://support.avaya.com/elmodocs2/security/ASA-2006-074.htm CONFIRM
http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm CONFIRM
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82992&apar=only
AIXAPAR IY82992
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82993&apar=only
AIXAPAR IY82993
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82994&apar=only
AIXAPAR IY82994
http://www.ciac.org/ciac/bulletins/q-151.shtml
CIAC Q-151
http://www.f-secure.com/security/fsc-2006-2.shtml CONFIRM
http://www.frsirt.com/english/advisories/2006/1068
VUPEN ADV-2006-1068
http://www.frsirt.com/english/advisories/2006/1072
VUPEN ADV-2006-1072
http://www.frsirt.com/english/advisories/2006/1139
VUPEN ADV-2006-1139
http://www.frsirt.com/english/advisories/2006/1157
VUPEN ADV-2006-1157
http://www.frsirt.com/english/advisories/2006/1529
VUPEN ADV-2006-1529
http://www.frsirt.com/english/advisories/2006/2189
VUPEN ADV-2006-2189
http://www.frsirt.com/english/advisories/2006/2490
VUPEN ADV-2006-2490
http://www.novell.com/linux/security/advisories/2006_17_sendmail.html
SUSE SUSE-SA:2006:017
http://www.mandriva.com/security/advisories?name=MDKSA-2006:058
MANDRIVA MDKSA-2006:058
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00017.html
FEDORA FEDORA-2006-194
http://www.osvdb.org/24037
OSVDB 24037
http://www.openbsd.org/errata38.html#sendmail
OPENBSD [3.8] 006: SECURITY FIX: March 25, 2006
http://www.redhat.com/archives/fedora-announce-list/2006-April/msg00018.html
FEDORA FEDORA-2006-193
http://www.frsirt.com/english/advisories/2006/1049
VUPEN ADV-2006-1049
http://www.kb.cert.org/vuls/id/834865
CERT-VN VU#834865
http://www.iss.net/threats/216.html
ISS 20060322 Sendmail Remote Signal Handling Vulnerability
http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml
GENTOO GLSA-200603-21
http://www.debian.org/security/2006/dsa-1015
DEBIAN DSA-1015
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200494-1
SUNALERT 200494
http://secunia.com/advisories/19367
SECUNIA 19367
http://secunia.com/advisories/19363
SECUNIA 19363
http://secunia.com/advisories/19342
SECUNIA 19342
http://xforce.iss.net/xforce/xfdb/24584
XF smtp-timeout-bo(24584)
http://www14.software.ibm.com/webapp/set2/subscriptions/pqvcmjd?mode=18&ID=2751 CONFIRM
http://www.redhat.com/support/errata/RHSA-2006-0264.html
REDHAT RHSA-2006:0264
http://www.frsirt.com/english/advisories/2006/1051
VUPEN ADV-2006-1051
http://www.openpkg.org/security/advisories/OpenPKG-SA-2006.007-sendmail.html
OPENPKG OpenPKG-SA-2006.007
http://www.redhat.com/support/errata/RHSA-2006-0265.html
REDHAT RHSA-2006:0265
http://www.securityfocus.com/archive/1/428536/100/0/threaded
BUGTRAQ 20060322 sendmail vuln advisories (CVE-2006-0058)
http://www.us-cert.gov/cas/techalerts/TA06-081A.html
CERT TA06-081A
http://www.sendmail.com/company/advisory/index.shtml CONFIRM

- Metasploit Modules Related To CVE-2006-0058

There are not any metasploit modules related to this CVE entry (Please visit www.metasploit.com for more information)


CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site. OVAL is a registered trademark of The MITRE Corporation and the authoritative source of OVAL content is MITRE's OVAL web site.
Use of this information constitutes acceptance for use in an AS IS condition. There are NO warranties, implied or otherwise, with regard to this information or its use. Any use of this information is at the user's risk. It is the responsibility of user to evaluate the accuracy, completeness or usefulness of any information, opinion, advice or other content. EACH USER WILL BE SOLELY RESPONSIBLE FOR ANY consequences of his or her direct or indirect use of this web site. ALL WARRANTIES OF ANY KIND ARE EXPRESSLY DISCLAIMED. This site will NOT BE LIABLE FOR ANY DIRECT, INDIRECT or any other kind of loss.