HomeSendmailCVE-2003-0694

CVE-2003-0694

UNKNOWN
10.0CVSS
Published: 2003-10-06
Updated: 2025-04-03
AI Analysis

Description

The prescan function in Sendmail 8.12.9 allows remote attackers to execute arbitrary code via buffer overflow attacks, as demonstrated using the parseaddr function in parseaddr.c.

CVSS Metrics

Vector
AV:N/AC:L/Au:N/C:C/I:C/A:C
Access Vector
network
Access Cmplx
low
Auth
none
Confidentiality
complete
Integrity
complete
Availability
complete
Weaknesses
NVD-CWE-Other

Metadata

Primary Vendor
SENDMAIL
Published
10/6/2003
Last Modified
4/3/2025
Source
NIST NVD
Note: Verify all details with official vendor sources before applying patches.

Affected Products

sendmail : advanced_message_serversendmail : advanced_message_serversendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmailsendmail : sendmail_prosendmail : sendmail_prosendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsendmail : sendmail_switchsgi : irixsgi : irixsgi : irixsgi : irixsgi : irixsgi : irixsgi : irixsgi : irixsgi : irixsgi : irixsgi : irixsgi : irixapple : mac_os_xapple : mac_os_xapple : mac_os_xapple : mac_os_xapple : mac_os_xapple : mac_os_xapple : mac_os_xapple : mac_os_x_serverapple : mac_os_x_serverapple : mac_os_x_serverapple : mac_os_x_serverapple : mac_os_x_serverapple : mac_os_x_serverapple : mac_os_x_servercompaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64compaq : tru64freebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdfreebsd : freebsdgentoo : linuxgentoo : linuxgentoo : linuxgentoo : linuxgentoo : linuxgentoo : linuxgentoo : linuxhp : hp-uxhp : hp-uxhp : hp-uxhp : hp-uxibm : aixibm : aixibm : aixnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdnetbsd : netbsdsun : solarissun : solarissun : solarissun : solarissun : solarissun : sunossun : sunossun : sunosturbolinux : turbolinux_advanced_serverturbolinux : turbolinux_serverturbolinux : turbolinux_serverturbolinux : turbolinux_serverturbolinux : turbolinux_serverturbolinux : turbolinux_workstationturbolinux : turbolinux_workstationturbolinux : turbolinux_workstation

AI-Powered Remediation

Generate remediation guidance or a C-suite brief for this vulnerability.

Executive Intelligence Brief