HomeSendmailCVE-2003-0681

CVE-2003-0681

UNKNOWN
7.5CVSS
Published: 2003-10-06
Updated: 2025-04-03
AI Analysis

Description

A "potential buffer overflow in ruleset parsing" for Sendmail 8.12.9, when using the nonstandard rulesets (1) recipient (2), final, or (3) mailer-specific envelope recipients, has unknown consequences.

CVSS Metrics

Vector
AV:N/AC:L/Au:N/C:P/I:P/A:P
Access Vector
network
Access Cmplx
low
Auth
none
Confidentiality
partial
Integrity
partial
Availability
partial
Weaknesses
NVD-CWE-Other

Metadata

Primary Vendor
SENDMAIL
Published
10/6/2003
Last Modified
4/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

sendmail : advanced_message_serversendmail : advanced_message_serversendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmail_prosendmail : sendmail_prosendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchapple : mac_os_xapple : mac_os_xapple : mac_os_xapple : mac_os_xapple : mac_os_xapple : mac_os_xapple : mac_os_xapple : mac_os_x_serverapple : mac_os_x_serverapple : mac_os_x_serverapple : mac_os_x_serverapple : mac_os_x_serverapple : mac_os_x_serverapple : mac_os_x_servergentoo : linuxgentoo : linuxgentoo : linuxgentoo : linuxgentoo : linuxgentoo : linuxgentoo : linuxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxibm : aixibm : aixibm : aixnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdopenbsd : openbsdopenbsd : openbsdturbolinux : turbolinux_advanced_serverturbolinux : turbolinux_serverturbolinux : turbolinux_serverturbolinux : turbolinux_serverturbolinux : turbolinux_serverturbolinux : turbolinux_workstationturbolinux : turbolinux_workstationturbolinux : turbolinux_workstation

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief