Vulnerability Details : CVE-2002-0906
Buffer overflow in Sendmail before 8.12.5, when configured to use a custom DNS map to query TXT records, allows remote attackers to cause a denial of service and possibly execute arbitrary code via a malicious DNS server.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2002-0906
- cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
Threat overview for CVE-2002-0906
Top countries where our scanners detected CVE-2002-0906
Top open port discovered on systems with this issue
22
IPs affected by CVE-2002-0906 2
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2002-0906!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2002-0906
2.97%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 85 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2002-0906
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2002-0906
-
http://www.kb.cert.org/vuls/id/814627
VU#814627 - Sendmail vulnerable to buffer overflow when DNS map is specified using TXT recordsUS Government Resource
-
http://www.securityfocus.com/bid/5122
-
http://www.sendmail.org/8.12.5.html
Sendmail Sentrion Open Source - Open Source Email Server | Proofpoint US
-
http://www.iss.net/security_center/static/9443.php
Patch;Vendor Advisory
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2183
404 Not Found
Jump to