CVE-2006-0058

N/A Unknown
Published: March 22, 2006 Modified: April 16, 2026
View on NVD

Description

Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://www.kb.cert.org/vuls/id/834865
Source: cret@cert.org
US Government Resource
http://www.osvdb.org/24037
Source: cret@cert.org
http://www.redhat.com/support/errata/RHSA-2006-0264.html
Source: cret@cert.org
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0265.html
Source: cret@cert.org
Patch Vendor Advisory
http://www.us-cert.gov/cas/techalerts/TA06-081A.html
Source: cret@cert.org
US Government Resource
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19342
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19345
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19346
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19349
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19356
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19360
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19361
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19363
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19367
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19368
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19394
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19404
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19407
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19450
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19466
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19532
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19533
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19676
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/19774
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20243
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/20723
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/612
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/743
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1015801
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102262-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102324-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-66-200494-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2006-074.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.avaya.com/elmodocs2/security/ASA-2006-078.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82992&apar=only
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82993&apar=only
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/search.wss?rs=0&q=IY82994&apar=only
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ciac.org/ciac/bulletins/q-151.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1015
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.f-secure.com/security/fsc-2006-2.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200603-21.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.iss.net/threats/216.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/834865
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:058
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openbsd.org/errata38.html#sendmail
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/24037
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0264.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.redhat.com/support/errata/RHSA-2006-0265.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.securityfocus.com/archive/1/428536/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/428656/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/17192
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.sendmail.com/company/advisory/index.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.us-cert.gov/cas/techalerts/TA06-081A.html
Source: af854a3a-2127-422b-91ae-364da2661108
US Government Resource
http://www.vupen.com/english/advisories/2006/1049
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1051
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1068
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1072
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1139
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1157
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/1529
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2189
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2490
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/24584
Source: af854a3a-2127-422b-91ae-364da2661108

148 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
59.0%
98th percentile
Exploitation Status
Not in CISA KEV

Affected Vendors

sendmail