CVE-2006-1173

N/A Unknown
Published: June 07, 2006 Modified: April 16, 2026
View on NVD

Description

Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/15779
Source: cret@cert.org
Patch Vendor Advisory
http://secunia.com/advisories/20473
Source: cret@cert.org
Patch Vendor Advisory
http://secunia.com/advisories/20641
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/20650
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/20651
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/20654
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/20673
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/20675
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/20679
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/20683
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/20684
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/20694
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/20726
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/20782
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/21042
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/21160
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/21327
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/21612
Source: cret@cert.org
Vendor Advisory
http://secunia.com/advisories/21647
Source: cret@cert.org
Vendor Advisory
http://www.kb.cert.org/vuls/id/146718
Source: cret@cert.org
Third Party Advisory US Government Resource
http://www.osvdb.org/26197
Source: cret@cert.org
http://www.securityfocus.com/bid/18433
Source: cret@cert.org
Patch
http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc
Source: cret@cert.org
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2006/2389
Source: cret@cert.org
Vendor Advisory
http://itrc.hp.com/service/cki/docDisplay.do?docId=c00692635
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/15779
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/20473
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://secunia.com/advisories/20641
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20650
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20651
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20654
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20673
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20675
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20679
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20683
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20684
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20694
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20726
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/20782
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21042
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21160
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21327
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21612
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/21647
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://securitytracker.com/id?1016295
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://support.avaya.com/elmodocs2/security/ASA-2006-148.htm
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/search.wss?rs=0&q=IY85415&apar=only
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-1.ibm.com/support/search.wss?rs=0&q=IY85930&apar=only
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2006/dsa-1155
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.f-secure.com/security/fsc-2006-5.shtml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.gentoo.org/security/en/glsa/glsa-200606-19.xml
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/146718
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2006:104
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.openbsd.org/errata38.html#sendmail2
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.osvdb.org/26197
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2006-0515.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/437928/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/438241/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/438330/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/440744/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/442939/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/18433
Source: af854a3a-2127-422b-91ae-364da2661108
Patch
http://www.sendmail.com/security/advisories/SA-200605-01.txt.asc
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2006/2189
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2351
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2388
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2389
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.vupen.com/english/advisories/2006/2390
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/2798
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2006/3135
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/27128
Source: af854a3a-2127-422b-91ae-364da2661108
https://issues.rpath.com/browse/RPL-526
Source: af854a3a-2127-422b-91ae-364da2661108

112 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
21.5%
96th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

sendmail