Vulnerability Description
Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the configuration file whose names contain characters with the high bit set, such as (1) macro names that are one character long, (2) a variable setting which is processed by the setoption function, or (3) a Modifiers setting which is processed by the getmodifiers function.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Sendmail | Sendmail | <= 8.12.1 |
References
- http://razor.bindview.com/publish/advisories/adv_sm812.htmlVendor Advisory
- http://www.iss.net/security_center/static/7192.php
- http://www.securityfocus.com/bid/3377
- http://razor.bindview.com/publish/advisories/adv_sm812.htmlVendor Advisory
- http://www.iss.net/security_center/static/7192.php
- http://www.securityfocus.com/bid/3377
FAQ
What is CVE-2001-0713?
CVE-2001-0713 is a vulnerability with a CVSS score of 4.6 (MEDIUM). Sendmail before 8.12.1 does not properly drop privileges when the -C option is used to load custom configuration files, which allows local users to gain privileges via malformed arguments in the confi...
How severe is CVE-2001-0713?
CVE-2001-0713 has been rated MEDIUM with a CVSS base score of 4.6/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2001-0713?
Check the references section above for vendor advisories and patch information. Affected products include: Sendmail Sendmail.