Description
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.
CVSS Metrics
- Vector
- AV:N/AC:L/Au:N/C:C/I:C/A:C
- Access Vector
- network
- Access Cmplx
- low
- Auth
- none
- Confidentiality
- complete
- Integrity
- complete
- Availability
- complete
- Weaknesses
- NVD-CWE-Other
Metadata
- Primary Vendor
- SENDMAIL
- Published
- 4/2/2003
- Last Modified
- 4/3/2025
- Source
- NIST NVD
- Note: Verify all details with official vendor sources before applying patches.
Affected Products
sendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchcompaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64hp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-ux_series_700hp : hp-ux_series_800hp : sissun : solarissun : solarissun : solarissun : solarissun : solarissun : solarissun : solarissun : solarissun : solarissun : solarissun : sunossun : sunossun : sunossun : sunossun : sunossun : sunos
AI-Powered Remediation
Generate remediation guidance or a C-suite brief for this vulnerability.