CVE-2002-1337

NameCVE-2002-1337
DescriptionBuffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-257

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sendmail (PTS)buster8.15.2-14~deb10u1fixed
bullseye8.15.2-22fixed
bookworm8.17.1.9-2fixed
trixie8.18.1-1fixed
sid8.18.1-2fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sendmailsourcewoody8.12.3-5DSA-257
sendmailsource(unstable)8.13.0.PreAlpha4-0
sendmail-widesourcewoody8.12.3+3.5Wbeta-5.2DSA-257
sendmail-winesource(unstable)(unfixed)

Notes

problem in sendmail 8.12, sarge uses 8.13

Search for package or bug name: Reporting problems