HomeSendmailCVE-2003-0161

CVE-2003-0161

UNKNOWN
10.0CVSS
Published: 2003-04-02
Updated: 2025-04-03
AI Analysis

Description

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.

CVSS Metrics

Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Access Vector
network
Access Cmplx
low
Auth
none
Confidentiality
complete
Integrity
complete
Availability
complete
Weaknesses
NVD-CWE-Other

Metadata

Primary Vendor
SENDMAIL
Published
4/2/2003
Last Modified
4/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

sendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchcompaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64hp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-ux_series_700hp : hp-ux_series_800hp : sissun : solarissun : solarissun : solarissun : solarissun : solarissun : solarissun : solarissun : solarissun : solarissun : solarissun : sunossun : sunossun : sunossun : sunossun : sunossun : sunos

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief

CVE-CVE-2003-0161 | UNKNOWN Severity | CVEDatabase.com | CVEDatabase.com