Vulnerability Details : CVE-2003-0694
Public exploit exists!
The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.
Vulnerability category: OverflowExecute code
Products affected by CVE-2003-0694
- cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
- cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
- cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
- cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
- cpe:2.3:o:sun:solaris:9.0:*:x86:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:3.0:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.0:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.4:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.3:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.3:release_p38:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.7:release_p17:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.7:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.4:release_p42:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.8:release_p6:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.8:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.9:pre-release:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.6:release_p20:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.6:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.1:release_p5:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.1:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.5:release_p32:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:4.5:releng:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.0:release_p14:*:*:*:*:*:*
- cpe:2.3:o:freebsd:freebsd:5.0:releng:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.18f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.18m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.17f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.17m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.15:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.16:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.19f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.20f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.20m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.21f:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.21m:*:*:*:*:*:*:*
- cpe:2.3:o:sgi:irix:6.5.19m:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*
- cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:4.3.3:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:ibm:aix:5.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:advanced_message_server:1.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:advanced_message_server:1.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_pro:8.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail_pro:8.9.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x:10.2.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.1:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.3:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.2:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.4:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.6:*:*:*:*:*:*:*
- cpe:2.3:o:apple:mac_os_x_server:10.2.5:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.4.3:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5.1:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5:*:sh3:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5.2:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5.3:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.5:*:x86:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.6:beta:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.6:*:*:*:*:*:*:*
- cpe:2.3:o:netbsd:netbsd:1.6.1:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:6.1:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_server:6.5:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_workstation:8.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_workstation:7.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_workstation:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:turbolinux:turbolinux_advanced_server:6.0:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1b_pk2_bl22:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a_pk4_bl21:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:5.1a_pk5_bl23:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0g_pk4_bl22:*:*:*:*:*:*:*
- cpe:2.3:o:compaq:tru64:4.0f_pk8_bl22:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.4:rc2:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.4:rc1:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.2:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:0.5:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:0.7:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.1a:*:*:*:*:*:*:*
- cpe:2.3:o:gentoo:linux:1.4:rc3:*:*:*:*:*:*
Threat overview for CVE-2003-0694
Top countries where our scanners detected CVE-2003-0694
Top open port discovered on systems with this issue
110
IPs affected by CVE-2003-0694 174
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2003-0694!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2003-0694
75.67%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 99 %
Percentile, the proportion of vulnerabilities that are scored at or less
Metasploit modules for CVE-2003-0694
-
Sendmail SMTP Address prescan Memory Corruption
Disclosure Date: 2003-09-17First seen: 2020-04-26auxiliary/dos/smtp/sendmail_prescanThis is a proof of concept denial of service module for Sendmail versions 8.12.8 and earlier. The vulnerability is within the prescan() method when parsing SMTP headers. Due to the prescan function, only 0x5c and 0x00 bytes can be used, limiting the likelihood for ar
CVSS scores for CVE-2003-0694
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
10.0
|
HIGH | AV:N/AC:L/Au:N/C:C/I:C/A:C |
10.0
|
10.0
|
NIST |
References for CVE-2003-0694
-
http://www.sendmail.org/8.12.10.html
Sendmail Sentrion Open Source - Open Source Email Server | Proofpoint USPatch
-
http://www.redhat.com/support/errata/RHSA-2003-283.html
Support
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2975
404 Not Found
-
http://www.cert.org/advisories/CA-2003-25.html
2003 CERT AdvisoriesPatch;Third Party Advisory;US Government Resource
-
http://marc.info/?l=bugtraq&m=106383437615742&w=2
'GLSA: sendmail (200309-13)' - MARC
-
http://www.redhat.com/support/errata/RHSA-2003-284.html
Support
-
http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html
-
http://marc.info/?l=bugtraq&m=106398718909274&w=2
'[OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail)' - MARC
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A572
404 Not Found
-
http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html
-
http://www.kb.cert.org/vuls/id/784980
VU#784980 - Sendmail prescan() buffer overflow vulnerabilityUS Government Resource
-
http://www.mandriva.com/security/advisories?name=MDKSA-2003:092
Mandriva
-
http://marc.info/?l=bugtraq&m=106382859407683&w=2
'[slackware-security] Sendmail vulnerabilities fixed (SSA:2003-260-02)' - MARC
-
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt
-
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742
CONECTIVA | AnĂ¡lises dos Melhores Produtos Online (#10 Melhores)
-
http://www.debian.org/security/2003/dsa-384
Debian -- The Universal Operating System
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A603
404 Not Found
-
http://marc.info/?l=bugtraq&m=106381604923204&w=2
'Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694]' - MARC
Jump to