The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a vigilance database and tools to fix them.

Computer vulnerabilities of Sendmail

TLS: weakening Diffie-Hellman via Logjam
An attacker, located as a Man-in-the-Middle, can force the TLS client/server to accept a weak export algorithm, in order to more easily capture or alter exchanged data...
1610582, 1647054, 1957980, 1958984, 1959033, 1959539, 1959745, 1960194, 1960418, 1960862, 1962398, 1962694, 1963151, 6245366, 9010038, 9010039, 9010041, 9010044, BSA-2015-005, bulletinjan2016, bulletinjul2015, c04725401, c04760669, c04767175, c04770140, c04773119, c04773241, c04774058, c04778650, c04832246, c04918839, c04926789, CERTFR-2016-AVI-303, CTX216642, CVE-2015-4000, DLA-507-1, DSA-2019-197, DSA-3287-1, DSA-3300-1, DSA-3688-1, FEDORA-2015-10047, FEDORA-2015-10108, FEDORA-2015-9048, FEDORA-2015-9130, FEDORA-2015-9161, FreeBSD-EN-15:08.sendmail, FreeBSD-SA-15:10.openssl, HPSBGN03399, HPSBGN03407, HPSBGN03411, HPSBGN03417, HPSBHF03433, HPSBMU03345, HPSBMU03401, HPSBUX03363, HPSBUX03388, HPSBUX03435, HPSBUX03512, JSA10681, Logjam, NetBSD-SA2015-008, NTAP-20150616-0001, NTAP-20150715-0001, NTAP-20151028-0001, openSUSE-SU-2015:1139-1, openSUSE-SU-2015:1209-1, openSUSE-SU-2015:1216-1, openSUSE-SU-2015:1277-1, openSUSE-SU-2016:0226-1, openSUSE-SU-2016:0255-1, openSUSE-SU-2016:0261-1, openSUSE-SU-2016:2267-1, PAN-SA-2016-0020, PAN-SA-2016-0028, RHSA-2015:1072-01, RHSA-2015:1185-01, RHSA-2015:1197-01, RHSA-2016:2054-01, RHSA-2016:2055-01, RHSA-2016:2056-01, SA111, SA40002, SA98, SB10122, SSA:2015-219-02, SSRT102180, SSRT102254, SSRT102964, SSRT102977, SUSE-SU-2015:1143-1, SUSE-SU-2015:1150-1, SUSE-SU-2015:1177-1, SUSE-SU-2015:1177-2, SUSE-SU-2015:1181-1, SUSE-SU-2015:1181-2, SUSE-SU-2015:1182-2, SUSE-SU-2015:1183-1, SUSE-SU-2015:1183-2, SUSE-SU-2015:1184-1, SUSE-SU-2015:1184-2, SUSE-SU-2015:1185-1, SUSE-SU-2015:1268-1, SUSE-SU-2015:1268-2, SUSE-SU-2015:1269-1, SUSE-SU-2015:1581-1, SUSE-SU-2016:0224-1, SUSE-SU-2018:1768-1, TSB16728, USN-2624-1, USN-2625-1, USN-2656-1, USN-2656-2, VIGILANCE-VUL-16950, VN-2015-007
TLS, SSH, VPN: weakening Diffie-Hellman via common primes
An attacker, located as a Man-in-the-Middle, can obtain the DH keys used by the TLS/SSH/VPN client/server, in order to more easily capture or alter exchanged data...
Sendmail: privilege escalation via File Descriptors
A local attacker can access to file descriptors left open by Sendmail, in order to escalate his privileges...
Sendmail: privilege escalation via File Descriptors
A local attacker can access to file descriptors of Sendmail, in order to escalate his privileges...
c05216368, CVE-2014-3956, FEDORA-2014-7093, FEDORA-2014-7095, FreeBSD-SA-14:11.sendmail, HPSBUX03632, MDVSA-2014:147, MDVSA-2015:128, openSUSE-SU-2014:0804-1, openSUSE-SU-2014:0805-1, SSA:2014-156-04, SSRT110194, VIGILANCE-VUL-14780
Sendmail: truncation of X.509 with null
When Sendmail uses certificates, an attacker can send a X.509 certificate with a Subject/Issuer field containing a null character, in order to bypass access restrictions...
275870, 6913961, BID-37543, c02009860, CERTA-2010-AVI-123, CVE-2009-4565, DSA-1985-1, FEDORA-2010-5399, FEDORA-2010-5470, HPSBUX02508, IZ72510, IZ72515, IZ72526, IZ72528, IZ72539, IZ72602, MDVSA-2010:003, RHSA-2010:0237-05, RHSA-2011:0262-01, SSRT100007, SUSE-SR:2010:006, TLSA-2010-3, VIGILANCE-VUL-9321
Sendmail: buffer overflow via X-Testing
On old Sendmail versions, an attacker can use a long X-Testing header in order to generate a denial of service and possibly to execute code...
BID-34944, BID-34949, CVE-2009-1490, CVE-2009-1491, VIGILANCE-VUL-8698
Sendmail: denial of service via MIME
An attacker can use long MIME lines in order to generate an error in Sendmail...
Sendmail: denial of service when finishing
An attacker can create a malicious message stopping Sendmail...
102664, 6458595, BID-19714, CERTA-2006-AVI-378, CVE-2006-4434, DSA-1164-1, IZ25577, MDKSA-2006:156, SUSE-SR:2006:021, TLSA-2006-28, VIGILANCE-VUL-6126
Sendmail: denial of service via a MIME message
An attacker can create an email containing deeply nested MIME in order to exhaust memory space of process...
102460, 20060601-01-P, 20060602-01-U, 373801, 380258, 6424201, BID-18433, c00680632, c00692635, CERTA-2006-AVI-246, CERTA-2006-AVI-336, CVE-2006-1173, DSA-1155-1, DSA-1155-2, DUXKIT1000636-V40FB22-ES-20060519, FEDORA-2006-836, FEDORA-2006-837, FLSA-2006:195418, FreeBSD-SA-06:17.sendmail, HPSBTU02116, HPSBUX02124, MDKSA-2006:104, NetBSD-SA2006-017, RHSA-2006:051, RHSA-2006:0515-01, SA-200605-01, SSA:2006-166-01, SSRT061135, SSRT061159, SUSE-SA:2006:032, T64V51AB-IX-631-SENDMAIL-SSRT-061135, TLSA-2006-9, VIGILANCE-VUL-5924, VU#146718
Sendmail: code execution via signals
An attacker can connect to a server to generate a race condition in asynchronous signals, and that could lead to code execution...
102262, 200494, 20060302-01-P, 20060401-01-U, 6397275, 6403051, BID-17192, BID-17207, c00692635, CERTA-2002-AVI-006, CERTA-2006-AVI-124, CVE-2006-0058, DSA-1015-1, DUXKIT1000636-V40FB22-ES-20060519, emr_na-c00629555-7, FEDORA-2006-193, FEDORA-2006-194, FLSA-2006:186277, FreeBSD-SA-06:13.sendmail, HPSBTU02116, HPSBUX02108, IY82992, IY82993, IY82994, MDKSA-2006:058, NetBSD-SA2006-010, RHSA-2006:026, RHSA-2006:0264-01, RHSA-2006:0265-01, SSA:2006-081-01, SSRT061133, SSRT061135, SUSE-SA:2006:017, T64V51AB-IX-631-SENDMAIL-SSRT-061135, TLSA-2006-5, VIGILANCE-VUL-5710, VU#834865
Our database contains other pages. You can request a free trial to read them.

Display information about Sendmail: