CVE-2002-1337

NameCVE-2002-1337
DescriptionBuffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.
SourceCVE (at NVD; CERT, LWN, oss-sec, fulldisc, Red Hat, Ubuntu, Gentoo, SUSE bugzilla/CVE, GitHub advisories/code/issues, web search, more)
ReferencesDSA-257

Vulnerable and fixed packages

The table below lists information on source packages.

Source PackageReleaseVersionStatus
sendmail (PTS)jessie8.14.4-8+deb8u2fixed
stretch (lts), stretch8.15.2-8+deb9u2fixed
buster (security), buster, buster (lts)8.15.2-14~deb10u3fixed
bullseye8.15.2-22+deb11u3fixed
bookworm8.17.1.9-2+deb12u2fixed
sid, trixie8.18.1-6fixed

The information below is based on the following data on fixed versions.

PackageTypeReleaseFixed VersionUrgencyOriginDebian Bugs
sendmailsourcewoody8.12.3-5DSA-257
sendmailsource(unstable)8.13.0.PreAlpha4-0
sendmail-widesourcewoody8.12.3+3.5Wbeta-5.2DSA-257
sendmail-winesource(unstable)(unfixed)

Notes

problem in sendmail 8.12, sarge uses 8.13

Search for package or bug name: Reporting problems