Description
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
No advisories yet.
References
History
Mon, 14 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Subscriptions
Compaq
Subscribe
Tru64
Subscribe
Hp
Subscribe
Hp-ux
Subscribe
Hp-ux Series 700
Subscribe
Hp-ux Series 800
Subscribe
Sis
Subscribe
Redhat
Subscribe
Enterprise Linux
Subscribe
Linux
Subscribe
Sendmail
Subscribe
Sendmail
Subscribe
Sendmail Switch
Subscribe
Sun
Subscribe
Solaris
Subscribe
Sunos
Subscribe
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-08T01:43:36.017Z
Reserved: 2003-03-24T00:00:00.000Z
Link: CVE-2003-0161
No data.
Status : Modified
Published: 2003-04-02T05:00:00.000
Modified: 2026-04-16T00:27:16.627
Link: CVE-2003-0161
OpenCVE Enrichment
No data.
Weaknesses