Vulnerability Details : CVE-2003-0681
A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.
Vulnerability category: Overflow
Products affected by CVE-2003-0681
- cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_pro:8.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_pro:8.9.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*
- cpe:2.3:o:openbsd:openbsd:3.3:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_advanced_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*
Threat overview for CVE-2003-0681
Top countries where our scanners detected CVE-2003-0681
Top open port discovered on systems with this issue
110
IPs affected by CVE-2003-0681 172
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2003-0681!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2003-0681
0.62%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 78 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2003-0681
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
7.5
|
HIGH | AV:N/AC:L/Au:N/C:P/I:P/A:P |
10.0
|
6.4
|
NIST |
References for CVE-2003-0681
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595
404 Not Found
-
http://www.sendmail.org/8.12.10.html
Sendmail Sentrion Open Source - Open Source Email Server | Proofpoint USPatch
-
http://www.redhat.com/support/errata/RHSA-2003-283.html
Support
-
http://www.kb.cert.org/vuls/id/108964
VU#108964 - Sendmail contains buffer overflow in ruleset parsingUS Government Resource
-
http://marc.info/?l=bugtraq&m=106383437615742&w=2
'GLSA: sendmail (200309-13)' - MARC
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/13216
Sendmail ruleset parsing buffer overflow CVE-2003-0681 Vulnerability Report
-
http://marc.info/?l=bugtraq&m=106398718909274&w=2
'[OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail)' - MARC
-
http://www.mandriva.com/security/advisories?name=MDKSA-2003:092
Mandriva
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606
404 Not Found
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)
-
http://www.debian.org/security/2003/dsa-384
Debian -- The Universal Operating System
-
http://www.securityfocus.com/bid/8649
Vendor Advisory
Jump to