Vulnerability Details : CVE-2006-1173
Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
Vulnerability category: Denial of service
Products affected by CVE-2006-1173
- cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*
Threat overview for CVE-2006-1173
Top countries where our scanners detected CVE-2006-1173
Top open port discovered on systems with this issue
80
IPs affected by CVE-2006-1173 280
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2006-1173!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2006-1173
21.90%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 95 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2006-1173
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:N/I:N/A:P |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2006-1173
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2006-1173
-
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc
-
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html
Object not found!
-
http://www.vupen.com/english/advisories/2006/2390
Site en construction
-
http://www.vupen.com/english/advisories/2006/3135
Site en construction
-
http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html
404 Page Not Found
-
http://www.securityfocus.com/archive/1/438330/100/0/threaded
-
http://www.securityfocus.com/archive/1/438241/100/0/threaded
-
ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P
-
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.631382
The Slackware Linux Project: Slackware Security Advisories
-
http://www.securityfocus.com/archive/1/440744/100/0/threaded
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/27128
Sendmail nested multipart MIME message denial of service CVE-2006-1173 Vulnerability Report
-
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
-
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253
404 Not Found
-
http://www.redhat.com/support/errata/RHSA-2006-0515.html
Support
-
http://www-1.ibm.com/support/search.wss?rs=0&q=IY85415&apar=only
-
http://securitytracker.com/id?1016295
Access Denied
-
http://www.vupen.com/english/advisories/2006/2351
Site en construction
-
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1
Patch;Vendor Advisory
-
http://www.securityfocus.com/archive/1/442939/100/0/threaded
-
http://www.vupen.com/english/advisories/2006/2189
Site en construction
-
http://www.vupen.com/english/advisories/2006/2388
Site en construction
-
http://www.vupen.com/english/advisories/2006/2389
Site en constructionVendor Advisory
-
http://www.f-secure.com/security/fsc-2006-5.shtml
Not found | F‑Secure
-
http://www.debian.org/security/2006/dsa-1155
Debian -- The Universal Operating System
-
http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc
Sendmail Sentrion Open Source - Open Source Email Server | Proofpoint USPatch;Vendor Advisory
-
http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm
ASA-2006-148 (SUN 102460, 102461)
-
http://www.securityfocus.com/archive/1/437928/100/0/threaded
-
http://www-1.ibm.com/support/search.wss?rs=0&q=IY85930&apar=only
-
http://www.kb.cert.org/vuls/id/146718
VU#146718 - Sendmail fails to handle malformed multipart MIME messagesThird Party Advisory;US Government Resource
-
http://www.openbsd.org/errata38.html#sendmail2
OpenBSD 3.8 Errata
-
http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml
Sendmail: Denial of service (GLSA 200606-19) — Gentoo security
-
http://www.vupen.com/english/advisories/2006/2798
Site en construction
-
http://www.securityfocus.com/bid/18433
Patch
-
http://www.mandriva.com/security/advisories?name=MDKSA-2006:104
Mandriva
-
https://issues.rpath.com/browse/RPL-526
-
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635
Jump to