CVE-2006-1173 (CNNVD-200606-168)
MEDIUM
中文标题:
Sendmail MIME消息 远程拒绝服务漏洞
英文标题:
Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malfo...
CVSS分数:
5.0
发布时间:
2006-06-07 23:00:00
漏洞类型:
资源管理错误
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
Sendmail是很多大型站点都在使用的邮件传输代理(MTA)。 Sendmail的递归mime8to7()函数在执行MIME转换时存在拒绝服务漏洞,远程攻击者可能利用此漏洞导致Sendmail发生拒绝服务。如果攻击者发送了深层嵌套的畸形MIME消息的话,则Sendmail在处理该消息时就会耗尽栈空间,导致无法传送队列中的消息。
英文描述:
Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
CWE类型:
CWE-399
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| sendmail | sendmail | * | - | - |
cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.8.8 | - | - |
cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.9.0 | - | - |
cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.9.1 | - | - |
cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.9.2 | - | - |
cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.9.3 | - | - |
cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.10 | - | - |
cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.10.1 | - | - |
cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.10.2 | - | - |
cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.11.0 | - | - |
cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.11.1 | - | - |
cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.11.2 | - | - |
cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.11.3 | - | - |
cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.11.4 | - | - |
cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.11.5 | - | - |
cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.11.6 | - | - |
cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.11.7 | - | - |
cpe:2.3:a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.0 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.1 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.2 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.3 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.4 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.5 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.6 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.7 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.8 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.9 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.10 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.12.11 | - | - |
cpe:2.3:a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.13.0 | - | - |
cpe:2.3:a:sendmail:sendmail:8.13.0:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.13.1 | - | - |
cpe:2.3:a:sendmail:sendmail:8.13.1:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.13.1.2 | - | - |
cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.13.2 | - | - |
cpe:2.3:a:sendmail:sendmail:8.13.2:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.13.3 | - | - |
cpe:2.3:a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.13.4 | - | - |
cpe:2.3:a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:*
|
| sendmail | sendmail | 8.13.5 | - | - |
cpe:2.3:a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
IY85415
vendor-advisory
cve.org
访问
cve.org
HPSBTU02116
vendor-advisory
cve.org
访问
cve.org
DSA-1155
vendor-advisory
cve.org
访问
cve.org
[3.8] 008: SECURITY FIX: June 15, 2006
vendor-advisory
cve.org
访问
cve.org
20684
third-party-advisory
cve.org
访问
cve.org
HPSBUX02124
vendor-advisory
cve.org
访问
cve.org
ADV-2006-2388
vdb-entry
cve.org
访问
cve.org
20726
third-party-advisory
cve.org
访问
cve.org
oval:org.mitre.oval:def:11253
vdb-entry
cve.org
访问
cve.org
ADV-2006-2351
vdb-entry
cve.org
访问
cve.org
21327
third-party-advisory
cve.org
访问
cve.org
RHSA-2006:0515
vendor-advisory
cve.org
访问
cve.org
ADV-2006-2389
vdb-entry
cve.org
访问
cve.org
21647
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
20651
third-party-advisory
cve.org
访问
cve.org
20683
third-party-advisory
cve.org
访问
cve.org
20650
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
20782
third-party-advisory
cve.org
访问
cve.org
ADV-2006-3135
vdb-entry
cve.org
访问
cve.org
1016295
vdb-entry
cve.org
访问
cve.org
20694
third-party-advisory
cve.org
访问
cve.org
20473
third-party-advisory
cve.org
访问
cve.org
ADV-2006-2189
vdb-entry
cve.org
访问
cve.org
20060721 rPSA-2006-0134-1 sendmail sendmail-cf
mailing-list
cve.org
访问
cve.org
20060601-01-P
vendor-advisory
cve.org
访问
cve.org
ADV-2006-2798
vdb-entry
cve.org
访问
cve.org
102460
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
20060602-01-U
vendor-advisory
cve.org
访问
cve.org
MDKSA-2006:104
vendor-advisory
cve.org
访问
cve.org
sendmail-multipart-mime-dos(27128)
vdb-entry
cve.org
访问
cve.org
20673
third-party-advisory
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
20060621 Re: Sendmail MIME DoS vulnerability
mailing-list
cve.org
访问
cve.org
21612
third-party-advisory
cve.org
访问
cve.org
20654
third-party-advisory
cve.org
访问
cve.org
ADV-2006-2390
vdb-entry
cve.org
访问
cve.org
SSA:2006-166-01
vendor-advisory
cve.org
访问
cve.org
GLSA-200606-19
vendor-advisory
cve.org
访问
cve.org
18433
vdb-entry
cve.org
访问
cve.org
20675
third-party-advisory
cve.org
访问
cve.org
SUSE-SA:2006:032
vendor-advisory
cve.org
访问
cve.org
FreeBSD-SA-06:17.sendmail
vendor-advisory
cve.org
访问
cve.org
20060620 Sendmail MIME DoS vulnerability
mailing-list
cve.org
访问
cve.org
VU#146718
third-party-advisory
cve.org
访问
cve.org
15779
third-party-advisory
cve.org
访问
cve.org
20641
third-party-advisory
cve.org
访问
cve.org
20679
third-party-advisory
cve.org
访问
cve.org
26197
vdb-entry
cve.org
访问
cve.org
21042
third-party-advisory
cve.org
访问
cve.org
21160
third-party-advisory
cve.org
访问
cve.org
IY85930
vendor-advisory
cve.org
访问
cve.org
20060624 Re: Sendmail MIME DoS vulnerability
mailing-list
cve.org
访问
cve.org
CVSS评分详情
5.0
MEDIUM
CVSS向量:
AV:N/AC:L/Au:N/C:N/I:N/A:P
CVSS版本:
2.0
机密性
NONE
完整性
NONE
可用性
PARTIAL
时间信息
发布时间:
2006-06-07 23:00:00
修改时间:
2024-08-07 17:03:28
创建时间:
2025-11-11 15:32:32
更新时间:
2025-11-11 15:49:07
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2006-1173 |
2025-11-11 15:17:40 | 2025-11-11 07:32:32 |
| NVD | nvd_CVE-2006-1173 |
2025-11-11 14:51:49 | 2025-11-11 07:41:18 |
| CNNVD | cnnvd_CNNVD-200606-168 |
2025-11-11 15:08:51 | 2025-11-11 07:49:07 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:49:07
vulnerability_type: 未提取 → 资源管理错误; cnnvd_id: 未提取 → CNNVD-200606-168; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 资源管理错误
- cnnvd_id: 未提取 -> CNNVD-200606-168
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:41:18
cvss_score: 未提取 → 5.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:N/I:N/A:P; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 37; references_count: 58 → 56; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.0
- cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:N/I:N/A:P
- cvss_version: NOT_EXTRACTED -> 2.0
- affected_products_count: 0 -> 37
- references_count: 58 -> 56
- data_sources: ['cve'] -> ['cve', 'nvd']