CVE-2002-1337

N/A Unknown
Published: March 07, 2003 Modified: April 16, 2026
View on NVD

Description

Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=104673778105192&w=2
Source: cve@mitre.org
Third Party Advisory
http://marc.info/?l=bugtraq&m=104678739608479&w=2
Source: cve@mitre.org
Third Party Advisory
http://marc.info/?l=bugtraq&m=104678862109841&w=2
Source: cve@mitre.org
Third Party Advisory
http://marc.info/?l=bugtraq&m=104678862409849&w=2
Source: cve@mitre.org
Third Party Advisory
http://marc.info/?l=bugtraq&m=104679411316818&w=2
Source: cve@mitre.org
Third Party Advisory
http://www.cert.org/advisories/CA-2003-07.html
Source: cve@mitre.org
Broken Link Patch Third Party Advisory US Government Resource
http://www.debian.org/security/2003/dsa-257
Source: cve@mitre.org
Broken Link
http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
http://www.kb.cert.org/vuls/id/398025
Source: cve@mitre.org
Third Party Advisory US Government Resource
http://www.securityfocus.com/bid/6991
Source: cve@mitre.org
Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.sendmail.org/8.12.8.html
Source: cve@mitre.org
Broken Link Patch Vendor Advisory
ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://marc.info/?l=bugtraq&m=104673778105192&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=104678739608479&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=104678862109841&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=104678862409849&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=104679411316818&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-1.ibm.com/support/search.wss?rs=0&q=IY40500&apar=only
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www-1.ibm.com/support/search.wss?rs=0&q=IY40501&apar=only
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www-1.ibm.com/support/search.wss?rs=0&q=IY40502&apar=only
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.cert.org/advisories/CA-2003-07.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Third Party Advisory US Government Resource
http://www.debian.org/security/2003/dsa-257
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory
http://www.iss.net/security_center/static/10748.php
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.kb.cert.org/vuls/id/398025
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.redhat.com/support/errata/RHSA-2003-073.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2003-074.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.redhat.com/support/errata/RHSA-2003-227.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://www.securityfocus.com/bid/6991
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Exploit Patch Third Party Advisory VDB Entry Vendor Advisory
http://www.sendmail.org/8.12.8.html
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link Patch Vendor Advisory

50 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
57.0%
98th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

gentoo netbsd sun windriver sendmail hp oracle