HIGH · 7.5

CVE-2003-0681

A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences...

Vulnerability Description

A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.

CVSS Score

7.5

HIGH

AV:N/AC:L/Au:N/C:P/I:P/A:P
Confidentiality
PARTIAL
Integrity
PARTIAL
Availability
PARTIAL

Affected Products

VendorProductVersions
SendmailAdvanced Message Server1.2
SendmailSendmail2.6
SendmailSendmail Pro8.9.2
SendmailSendmail Switch2.1
AppleMac Os X10.2
AppleMac Os X Server10.2
GentooLinux0.5
HpHp-Ux11.00
IbmAix4.3.3
NetbsdNetbsd1.4.3
OpenbsdOpenbsd3.2
TurbolinuxTurbolinux Advanced Server6.0
TurbolinuxTurbolinux Server6.1
TurbolinuxTurbolinux Workstation6.0

References

FAQ

What is CVE-2003-0681?

CVE-2003-0681 is a vulnerability with a CVSS score of 7.5 (HIGH). A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences...

How severe is CVE-2003-0681?

CVE-2003-0681 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.

Is there a patch for CVE-2003-0681?

Check the references section above for vendor advisories and patch information. Affected products include: Sendmail Advanced Message Server, Sendmail Sendmail, Sendmail Sendmail Pro, Sendmail Sendmail Switch, Apple Mac Os X.