Computer Security
[EN] securityvulns.ru no-pyccku


Sendmail mail server race conditions
updated since 22.03.2006
Published:24.03.2006
Source:
SecurityVulns ID:5929
Type:remote
Threat Level:
9/10
Description:Race conditions on signals processing with setjmp/longjmp allow remote code execution.
Affected:SENDMAIL : Sendmail 8.12
 SENDMAIL : Sendmail 8.13
 FREEBSD : FreeBSD 4.10
 FREEBSD : FreeBSD 5.3
 FREEBSD : FreeBSD 5.4
 FREEBSD : FreeBSD 4.11
 FREEBSD : FreeBSD 6.0
 FREEBSD : FreeBSD 6.1
 FREEBSD : FreeBSD 5.5
Original documentdocumentJack, [Full-disclosure] sendmail stuff2 (24.03.2006)
 documentCERT, US-CERT Technical Cyber Security Alert TA06-081A -- Sendmail Race Condition Vulnerability (23.03.2006)
 documentSENDMAIL, Sendmail 8.13.6 release notes (22.03.2006)
 documentFREEBSD, FreeBSD Security Advisory FreeBSD-SA-06:13.sendmail (22.03.2006)
Files:sendmail tester draft

About | Terms of use | Privacy Policy
© SecurityVulns, 3APA3A, Vladimir Dubrovin
Nizhny Novgorod