CVE-2006-1173

Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
References
Link Resource
http://www.kb.cert.org/vuls/id/146718 Third Party Advisory US Government Resource
http://secunia.com/advisories/20473 Patch Vendor Advisory
http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0515.html
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1 Patch Vendor Advisory
http://www.securityfocus.com/bid/18433 Patch
http://securitytracker.com/id?1016295
http://secunia.com/advisories/15779 Patch Vendor Advisory
http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html
http://www-1.ibm.com/support/search.wss?rs=0&q=IY85415&apar=only
http://www-1.ibm.com/support/search.wss?rs=0&q=IY85930&apar=only
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.asc
http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml
http://www.openbsd.org/errata38.html#sendmail2
ftp://patches.sgi.com/support/free/security/advisories/20060601-01-P
http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.631382
http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html
http://secunia.com/advisories/20641 Vendor Advisory
http://secunia.com/advisories/20650 Vendor Advisory
http://secunia.com/advisories/20651 Vendor Advisory
http://secunia.com/advisories/20654 Vendor Advisory
http://secunia.com/advisories/20673 Vendor Advisory
http://secunia.com/advisories/20675 Vendor Advisory
http://secunia.com/advisories/20679 Vendor Advisory
http://secunia.com/advisories/20683 Vendor Advisory
http://secunia.com/advisories/20684 Vendor Advisory
http://secunia.com/advisories/20694 Vendor Advisory
ftp://patches.sgi.com/support/free/security/advisories/20060602-01-U.asc
http://secunia.com/advisories/20726 Vendor Advisory
http://secunia.com/advisories/20782 Vendor Advisory
http://www.f-secure.com/security/fsc-2006-5.shtml
http://secunia.com/advisories/21042 Vendor Advisory
https://issues.rpath.com/browse/RPL-526
http://secunia.com/advisories/21160 Vendor Advisory
http://secunia.com/advisories/21327 Vendor Advisory
http://www.debian.org/security/2006/dsa-1155
http://secunia.com/advisories/21612 Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm
http://www.osvdb.org/26197
http://secunia.com/advisories/21647 Vendor Advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2006:104
http://www.vupen.com/english/advisories/2006/2389 Vendor Advisory
http://www.vupen.com/english/advisories/2006/2390
http://www.vupen.com/english/advisories/2006/3135
http://www.vupen.com/english/advisories/2006/2189
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635
http://www.vupen.com/english/advisories/2006/2351
http://www.vupen.com/english/advisories/2006/2798
http://www.vupen.com/english/advisories/2006/2388
https://exchange.xforce.ibmcloud.com/vulnerabilities/27128
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253
http://www.securityfocus.com/archive/1/442939/100/0/threaded
http://www.securityfocus.com/archive/1/440744/100/0/threaded
http://www.securityfocus.com/archive/1/438330/100/0/threaded
http://www.securityfocus.com/archive/1/438241/100/0/threaded
http://www.securityfocus.com/archive/1/437928/100/0/threaded
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.13.1:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.13.0:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:*
cpe:2.3:a:sendmail:sendmail:8.13.2:*:*:*:*:*:*:*

Information

Published : 2006-06-07 16:06

Updated : 2018-10-18 09:31


NVD link : CVE-2006-1173

Mitre link : CVE-2006-1173


JSON object : View

CWE
CWE-399

Resource Management Errors

Advertisement

dedicated server usa

Products Affected

sendmail

  • sendmail