Vulnerability Details : CVE-2003-0161
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
Vulnerability category: OverflowExecute codeDenial of service
Products affected by CVE-2003-0161
- cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.5.1:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:x86_update_2:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux_series_700:10.20:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux_series_800:10.20:*:*:*:*:*:*:*
- cpe:2.3:o:hp:sis:*:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.0:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0d:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.0_pk4_bl17:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.0a_pk3_bl17:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.0_pk4_bl18:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0d_pk9_bl17:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0b:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.0f:*:*:*:*:*:*:*
Threat overview for CVE-2003-0161
Top countries where our scanners detected CVE-2003-0161
Top open port discovered on systems with this issue
110
IPs affected by CVE-2003-0161 169
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2003-0161!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2003-0161
17.22%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0161
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2003-0161
-
http://www.securityfocus.com/bid/7230
Patch;Vendor Advisory
-
http://www.cert.org/advisories/CA-2003-12.html
2003 CERT AdvisoriesPatch;Third Party Advisory;US Government Resource
-
http://www.redhat.com/support/errata/RHSA-2003-120.html
SupportPatch;Vendor Advisory
-
http://marc.info/?l=bugtraq&m=104897487512238&w=2
'Sendmail: -1 gone wild' - MARC
-
http://www.securityfocus.com/archive/1/316961/30/25250/threaded
-
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1
-
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt
-
http://www.securityfocus.com/archive/1/317135/30/25220/threaded
-
http://lists.apple.com/mhonarc/security-announce/msg00028.html
404 Not Found
-
http://www.redhat.com/support/errata/RHSA-2003-121.html
Support
-
http://www.debian.org/security/2003/dsa-278
Debian -- The Universal Operating System
-
ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc
-
http://marc.info/?l=bugtraq&m=104896621106790&w=2
'sendmail 8.12.9 available' - MARC
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000614
CONECTIVA | Análises dos Melhores Produtos Online (#10 Melhores)
-
http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml
Gentoo Linux — Error 404 (Not Found)
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1
-
http://www.securityfocus.com/archive/1/321997
-
http://marc.info/?l=bugtraq&m=104914999806315&w=2
'[OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail)' - MARC
-
http://www.kb.cert.org/vuls/id/897604
VU#897604 - Sendmail address parsing buffer overflowUS Government Resource
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1
-
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt
-
http://www.debian.org/security/2003/dsa-290
Debian -- The Universal Operating System
-
http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html
[Full-Disclosure] Mailing List Charter
Jump to