CVE-2002-1337

NameCVE-2002-1337
DescriptionBuffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SuSE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-257
NVD severityhigh (attack range: remote)

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sendmail (PTS)wheezy8.14.4-4+deb7u1fixed
jessie8.14.4-8+deb8u2fixed
stretch8.15.2-8fixed
buster, sid8.15.2-9fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sendmailsource(unstable)8.13.0.PreAlpha4-0high
sendmailsourcewoody8.12.3-5highDSA-257
sendmail-widesourcewoody8.12.3+3.5Wbeta-5.2highDSA-257
sendmail-winesource(unstable)(unfixed)high

Notes

problem in sendmail 8.12, sarge uses 8.13

Search for package or bug name: Reporting problems