Name | CVE-2002-1337 |
Description | Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c. |
Source | CVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more) |
References | DSA-257 |
Vulnerable and fixed packages
The table below lists information on source packages.
Source Package | Release | Version | Status |
---|
sendmail (PTS) | jessie | 8.14.4-8+deb8u2 | fixed |
| stretch (lts), stretch | 8.15.2-8+deb9u2 | fixed |
| buster (security), buster, buster (lts) | 8.15.2-14~deb10u3 | fixed |
| bullseye | 8.15.2-22+deb11u3 | fixed |
| bookworm | 8.17.1.9-2+deb12u2 | fixed |
| sid, trixie | 8.18.1-6 | fixed |
The information below is based on the following data on fixed versions.
Notes
problem in sendmail 8.12, sarge uses 8.13