CVE-2006-1173

high

Description

Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.

References

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253

https://issues.rpath.com/browse/RPL-526

https://exchange.xforce.ibmcloud.com/vulnerabilities/27128

http://www.vupen.com/english/advisories/2006/3135

http://www.vupen.com/english/advisories/2006/2798

http://www.vupen.com/english/advisories/2006/2390

http://www.vupen.com/english/advisories/2006/2389

http://www.vupen.com/english/advisories/2006/2388

http://www.vupen.com/english/advisories/2006/2351

http://www.vupen.com/english/advisories/2006/2189

http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc

http://www.securityfocus.com/bid/18433

http://www.securityfocus.com/archive/1/442939/100/0/threaded

http://www.securityfocus.com/archive/1/440744/100/0/threaded

http://www.securityfocus.com/archive/1/438330/100/0/threaded

http://www.securityfocus.com/archive/1/438241/100/0/threaded

http://www.securityfocus.com/archive/1/437928/100/0/threaded

http://www.redhat.com/support/errata/RHSA-2006-0515.html

http://www.osvdb.org/26197

http://www.openbsd.org/errata38.html#sendmail2

http://www.mandriva.com/security/advisories?name=MDKSA-2006:104

http://www.kb.cert.org/vuls/id/146718

http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml

http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html

http://www.f-secure.com/security/fsc-2006-5.shtml

http://www.debian.org/security/2006/dsa-1155

http://www-1.ibm.com/support/search.wss?rs=0&q=IY85930&apar=only

http://www-1.ibm.com/support/search.wss?rs=0&q=IY85415&apar=only

http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm

http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1

http://slackware.com/security/viewer.php?l=slackware-security&y=2006&m=slackware-security.631382

http://securitytracker.com/id?1016295

http://secunia.com/advisories/21647

http://secunia.com/advisories/21612

http://secunia.com/advisories/21327

http://secunia.com/advisories/21160

http://secunia.com/advisories/21042

http://secunia.com/advisories/20782

http://secunia.com/advisories/20726

http://secunia.com/advisories/20694

http://secunia.com/advisories/20684

http://secunia.com/advisories/20683

http://secunia.com/advisories/20679

http://secunia.com/advisories/20675

http://secunia.com/advisories/20673

http://secunia.com/advisories/20654

http://secunia.com/advisories/20651

http://secunia.com/advisories/20650

http://secunia.com/advisories/20641

http://secunia.com/advisories/20473

http://secunia.com/advisories/15779

http://lists.suse.com/archive/suse-security-announce/2006-Jun/0006.html

http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635

Details

Source: Mitre, NVD

Published: 2006-06-07

Updated: 2018-10-18

Risk Information

CVSS v2

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P

Severity: Medium

CVSS v3

Base Score: 7.5

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H

Severity: High