CVE-2002-1337

NameCVE-2002-1337
DescriptionBuffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, bugtraq, EDB, Metasploit, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, Mageia, GitHub code/issues, web search, more)
ReferencesDSA-257
NVD severityhigh

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sendmail (PTS)stretch8.15.2-8+deb9u1fixed
buster8.15.2-14~deb10u1fixed
bullseye, sid8.15.2-20fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sendmailsourcewoody8.12.3-5DSA-257
sendmailsource(unstable)8.13.0.PreAlpha4-0
sendmail-widesourcewoody8.12.3+3.5Wbeta-5.2DSA-257
sendmail-winesource(unstable)(unfixed)

Notes

problem in sendmail 8.12, sarge uses 8.13

Search for package or bug name: Reporting problems