CVE-2003-0161 (CNNVD-200304-025)

CRITICAL 有利用代码
中文标题:
Sendmail地址预扫描内存破坏漏洞
英文标题:
The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not proper...
CVSS分数: 10.0
发布时间: 2003-04-01 05:00:00
漏洞类型: 授权问题
状态: PUBLISHED
数据质量分数: 0.40
数据版本: v5
漏洞描述
中文描述:

大多数组织在他们网络内部的各个位置有各种邮件传输代理(MTA),其中至少有一个直接连接于互联网。Sendmail是其中最流行的MTA,据统计通过Sendmail处理的Internet邮件流量占了总数的50%到75%。许多UNIX和Linux工作站默认运行Sendmail。 sendmail在处理邮件地址时缺少正确的长度检查,远程攻击者可以利用这个漏洞对Sendmail服务进行缓冲区溢出,可能以sendmail进程权限在系统上执行任意命令。 此漏洞存在于prescan()过程中,此函数用于处理SMTP头中的EMAIL地址,由于在转换字符到整数时存在一个逻辑错误,导致能充分的检查email地址的长度。有特别创建地址的email消息可能触发一个栈溢出。 这个漏洞是针对消息的,而不是针对连接的。也就是说这个漏洞是由特别创建的邮件消息的内容触发的,而不是由较低水平的网络通讯触发的。这一点很重要,因为没有漏洞的MTA会与其他网络内受保护MTA一同传送恶意消息。换句话说,即使站点的边界MTA使用的软件不是sendmail,网络内部存在漏洞的sendmail服务程序仍受威胁。能够利用这个漏洞的消息也能在未被发现的情况下穿透许多常见的报文过滤或防火墙。 目前已经成功的利用这个漏洞在实验室环境中导致拒绝服务。在一些有漏洞的系统中可以利用这个漏洞执行代码。

英文描述:

The prescan() function in the address parser (parseaddr.c) in Sendmail before 8.12.9 does not properly handle certain conversions from char and int types, which can cause a length check to be disabled when Sendmail misinterprets an input value as a special "NOCHAR" control value, allowing attackers to cause a denial of service and possibly execute arbitrary code via a buffer overflow attack using messages, a different vulnerability than CVE-2002-1337.

CWE类型:
(暂无数据)
标签:
local unix sorbo OSVDB-8294 remote linux bysin
受影响产品
厂商 产品 版本 版本范围 平台 CPE
sendmail sendmail 2.6 - - cpe:2.3:a:sendmail:sendmail:2.6:*:*:*:*:*:*:*
sendmail sendmail 2.6.1 - - cpe:2.3:a:sendmail:sendmail:2.6.1:*:*:*:*:*:*:*
sendmail sendmail 2.6.2 - - cpe:2.3:a:sendmail:sendmail:2.6.2:*:*:*:*:*:*:*
sendmail sendmail 3.0 - - cpe:2.3:a:sendmail:sendmail:3.0:*:*:*:*:*:*:*
sendmail sendmail 3.0.1 - - cpe:2.3:a:sendmail:sendmail:3.0.1:*:*:*:*:*:*:*
sendmail sendmail 3.0.2 - - cpe:2.3:a:sendmail:sendmail:3.0.2:*:*:*:*:*:*:*
sendmail sendmail 3.0.3 - - cpe:2.3:a:sendmail:sendmail:3.0.3:*:*:*:*:*:*:*
sendmail sendmail 8.9.0 - - cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*
sendmail sendmail 8.9.1 - - cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*
sendmail sendmail 8.9.2 - - cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*
sendmail sendmail 8.9.3 - - cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*
sendmail sendmail 8.10 - - cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
sendmail sendmail 8.10.1 - - cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
sendmail sendmail 8.10.2 - - cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
sendmail sendmail 8.11.0 - - cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
sendmail sendmail 8.11.1 - - cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
sendmail sendmail 8.11.2 - - cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
sendmail sendmail 8.11.3 - - cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
sendmail sendmail 8.11.4 - - cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
sendmail sendmail 8.11.5 - - cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
sendmail sendmail 8.11.6 - - cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*
sendmail sendmail 8.12 - - cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
sendmail sendmail 8.12.0 - - cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
sendmail sendmail 8.12.1 - - cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
sendmail sendmail 8.12.2 - - cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*
sendmail sendmail 8.12.3 - - cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
sendmail sendmail 8.12.4 - - cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
sendmail sendmail 8.12.5 - - cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*
sendmail sendmail 8.12.6 - - cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*
sendmail sendmail 8.12.7 - - cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*
sendmail sendmail 8.12.8 - - cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*
sendmail sendmail_switch 2.1 - - cpe:2.3:a:sendmail:sendmail_switch:2.1:*:*:*:*:*:*:*
sendmail sendmail_switch 2.1.1 - - cpe:2.3:a:sendmail:sendmail_switch:2.1.1:*:*:*:*:*:*:*
sendmail sendmail_switch 2.1.2 - - cpe:2.3:a:sendmail:sendmail_switch:2.1.2:*:*:*:*:*:*:*
sendmail sendmail_switch 2.1.3 - - cpe:2.3:a:sendmail:sendmail_switch:2.1.3:*:*:*:*:*:*:*
sendmail sendmail_switch 2.1.4 - - cpe:2.3:a:sendmail:sendmail_switch:2.1.4:*:*:*:*:*:*:*
sendmail sendmail_switch 2.1.5 - - cpe:2.3:a:sendmail:sendmail_switch:2.1.5:*:*:*:*:*:*:*
sendmail sendmail_switch 2.2 - - cpe:2.3:a:sendmail:sendmail_switch:2.2:*:*:*:*:*:*:*
sendmail sendmail_switch 2.2.1 - - cpe:2.3:a:sendmail:sendmail_switch:2.2.1:*:*:*:*:*:*:*
sendmail sendmail_switch 2.2.2 - - cpe:2.3:a:sendmail:sendmail_switch:2.2.2:*:*:*:*:*:*:*
sendmail sendmail_switch 2.2.3 - - cpe:2.3:a:sendmail:sendmail_switch:2.2.3:*:*:*:*:*:*:*
sendmail sendmail_switch 2.2.4 - - cpe:2.3:a:sendmail:sendmail_switch:2.2.4:*:*:*:*:*:*:*
sendmail sendmail_switch 2.2.5 - - cpe:2.3:a:sendmail:sendmail_switch:2.2.5:*:*:*:*:*:*:*
sendmail sendmail_switch 3.0 - - cpe:2.3:a:sendmail:sendmail_switch:3.0:*:*:*:*:*:*:*
sendmail sendmail_switch 3.0.1 - - cpe:2.3:a:sendmail:sendmail_switch:3.0.1:*:*:*:*:*:*:*
sendmail sendmail_switch 3.0.2 - - cpe:2.3:a:sendmail:sendmail_switch:3.0.2:*:*:*:*:*:*:*
sendmail sendmail_switch 3.0.3 - - cpe:2.3:a:sendmail:sendmail_switch:3.0.3:*:*:*:*:*:*:*
compaq tru64 4.0b - - cpe:2.3:o:compaq:tru64:4.0b:*:*:*:*:*:*:*
compaq tru64 4.0d - - cpe:2.3:o:compaq:tru64:4.0d:*:*:*:*:*:*:*
compaq tru64 4.0d_pk9_bl17 - - cpe:2.3:o:compaq:tru64:4.0d_pk9_bl17:*:*:*:*:*:*:*
compaq tru64 4.0f - - cpe:2.3:o:compaq:tru64:4.0f:*:*:*:*:*:*:*
compaq tru64 4.0f_pk6_bl17 - - cpe:2.3:o:compaq:tru64:4.0f_pk6_bl17:*:*:*:*:*:*:*
compaq tru64 4.0f_pk7_bl18 - - cpe:2.3:o:compaq:tru64:4.0f_pk7_bl18:*:*:*:*:*:*:*
compaq tru64 4.0g - - cpe:2.3:o:compaq:tru64:4.0g:*:*:*:*:*:*:*
compaq tru64 4.0g_pk3_bl17 - - cpe:2.3:o:compaq:tru64:4.0g_pk3_bl17:*:*:*:*:*:*:*
compaq tru64 5.0 - - cpe:2.3:o:compaq:tru64:5.0:*:*:*:*:*:*:*
compaq tru64 5.0_pk4_bl17 - - cpe:2.3:o:compaq:tru64:5.0_pk4_bl17:*:*:*:*:*:*:*
compaq tru64 5.0_pk4_bl18 - - cpe:2.3:o:compaq:tru64:5.0_pk4_bl18:*:*:*:*:*:*:*
compaq tru64 5.0a - - cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*
compaq tru64 5.0a_pk3_bl17 - - cpe:2.3:o:compaq:tru64:5.0a_pk3_bl17:*:*:*:*:*:*:*
compaq tru64 5.0f - - cpe:2.3:o:compaq:tru64:5.0f:*:*:*:*:*:*:*
compaq tru64 5.1 - - cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*
compaq tru64 5.1_pk3_bl17 - - cpe:2.3:o:compaq:tru64:5.1_pk3_bl17:*:*:*:*:*:*:*
compaq tru64 5.1_pk4_bl18 - - cpe:2.3:o:compaq:tru64:5.1_pk4_bl18:*:*:*:*:*:*:*
compaq tru64 5.1_pk5_bl19 - - cpe:2.3:o:compaq:tru64:5.1_pk5_bl19:*:*:*:*:*:*:*
compaq tru64 5.1_pk6_bl20 - - cpe:2.3:o:compaq:tru64:5.1_pk6_bl20:*:*:*:*:*:*:*
compaq tru64 5.1a - - cpe:2.3:o:compaq:tru64:5.1a:*:*:*:*:*:*:*
compaq tru64 5.1a_pk1_bl1 - - cpe:2.3:o:compaq:tru64:5.1a_pk1_bl1:*:*:*:*:*:*:*
compaq tru64 5.1a_pk2_bl2 - - cpe:2.3:o:compaq:tru64:5.1a_pk2_bl2:*:*:*:*:*:*:*
compaq tru64 5.1a_pk3_bl3 - - cpe:2.3:o:compaq:tru64:5.1a_pk3_bl3:*:*:*:*:*:*:*
compaq tru64 5.1b - - cpe:2.3:o:compaq:tru64:5.1b:*:*:*:*:*:*:*
compaq tru64 5.1b_pk1_bl1 - - cpe:2.3:o:compaq:tru64:5.1b_pk1_bl1:*:*:*:*:*:*:*
hp hp-ux 10.00 - - cpe:2.3:o:hp:hp-ux:10.00:*:*:*:*:*:*:*
hp hp-ux 10.01 - - cpe:2.3:o:hp:hp-ux:10.01:*:*:*:*:*:*:*
hp hp-ux 10.08 - - cpe:2.3:o:hp:hp-ux:10.08:*:*:*:*:*:*:*
hp hp-ux 10.09 - - cpe:2.3:o:hp:hp-ux:10.09:*:*:*:*:*:*:*
hp hp-ux 10.10 - - cpe:2.3:o:hp:hp-ux:10.10:*:*:*:*:*:*:*
hp hp-ux 10.16 - - cpe:2.3:o:hp:hp-ux:10.16:*:*:*:*:*:*:*
hp hp-ux 10.20 - - cpe:2.3:o:hp:hp-ux:10.20:*:*:*:*:*:*:*
hp hp-ux 10.24 - - cpe:2.3:o:hp:hp-ux:10.24:*:*:*:*:*:*:*
hp hp-ux 10.26 - - cpe:2.3:o:hp:hp-ux:10.26:*:*:*:*:*:*:*
hp hp-ux 10.30 - - cpe:2.3:o:hp:hp-ux:10.30:*:*:*:*:*:*:*
hp hp-ux 10.34 - - cpe:2.3:o:hp:hp-ux:10.34:*:*:*:*:*:*:*
hp hp-ux 11.00 - - cpe:2.3:o:hp:hp-ux:11.00:*:*:*:*:*:*:*
hp hp-ux 11.0.4 - - cpe:2.3:o:hp:hp-ux:11.0.4:*:*:*:*:*:*:*
hp hp-ux 11.11 - - cpe:2.3:o:hp:hp-ux:11.11:*:*:*:*:*:*:*
hp hp-ux 11.20 - - cpe:2.3:o:hp:hp-ux:11.20:*:*:*:*:*:*:*
hp hp-ux 11.22 - - cpe:2.3:o:hp:hp-ux:11.22:*:*:*:*:*:*:*
hp hp-ux_series_700 10.20 - - cpe:2.3:o:hp:hp-ux_series_700:10.20:*:*:*:*:*:*:*
hp hp-ux_series_800 10.20 - - cpe:2.3:o:hp:hp-ux_series_800:10.20:*:*:*:*:*:*:*
hp sis * - - cpe:2.3:o:hp:sis:*:*:*:*:*:*:*:*
sun solaris 2.4 - - cpe:2.3:o:sun:solaris:2.4:*:x86:*:*:*:*:*
sun solaris 2.5 - - cpe:2.3:o:sun:solaris:2.5:*:x86:*:*:*:*:*
sun solaris 2.5.1 - - cpe:2.3:o:sun:solaris:2.5.1:*:ppc:*:*:*:*:*
sun solaris 2.6 - - cpe:2.3:o:sun:solaris:2.6:*:*:*:*:*:*:*
sun solaris 7.0 - - cpe:2.3:o:sun:solaris:7.0:*:x86:*:*:*:*:*
sun solaris 8.0 - - cpe:2.3:o:sun:solaris:8.0:*:x86:*:*:*:*:*
sun solaris 9.0 - - cpe:2.3:o:sun:solaris:9.0:*:sparc:*:*:*:*:*
sun sunos - - - cpe:2.3:o:sun:sunos:-:*:*:*:*:*:*:*
sun sunos 5.4 - - cpe:2.3:o:sun:sunos:5.4:*:*:*:*:*:*:*
sun sunos 5.5 - - cpe:2.3:o:sun:sunos:5.5:*:*:*:*:*:*:*
sun sunos 5.5.1 - - cpe:2.3:o:sun:sunos:5.5.1:*:*:*:*:*:*:*
sun sunos 5.7 - - cpe:2.3:o:sun:sunos:5.7:*:*:*:*:*:*:*
sun sunos 5.8 - - cpe:2.3:o:sun:sunos:5.8:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
1001088 vendor-advisory
cve.org
访问
52620 vendor-advisory
cve.org
访问
20030401-01-P vendor-advisory
cve.org
访问
7230 vdb-entry
cve.org
访问
20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail) mailing-list
cve.org
访问
RHSA-2003:120 vendor-advisory
cve.org
访问
20030401 Immunix Secured OS 7+ openssl update mailing-list
cve.org
访问
DSA-278 vendor-advisory
cve.org
访问
DSA-290 vendor-advisory
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
52700 vendor-advisory
cve.org
访问
CA-2003-12 third-party-advisory
cve.org
访问
CSSA-2003-016.0 vendor-advisory
cve.org
访问
20030331 GLSA: sendmail (200303-27) mailing-list
cve.org
访问
RHSA-2003:121 vendor-advisory
cve.org
访问
CLA-2003:614 vendor-advisory
cve.org
访问
SCOSA-2004.11 vendor-advisory
cve.org
访问
GLSA-200303-27 vendor-advisory
cve.org
访问
20030329 Sendmail: -1 gone wild mailing-list
cve.org
访问
20030329 Sendmail: -1 gone wild mailing-list
cve.org
访问
FreeBSD-SA-03:07 vendor-advisory
cve.org
访问
20030520 [Fwd: 127 Research and Development: 127 Day!] mailing-list
cve.org
访问
20030329 sendmail 8.12.9 available mailing-list
cve.org
访问
VU#897604 third-party-advisory
cve.org
访问
ExploitDB EDB-22442 EXPLOIT
exploitdb
访问
Download Exploit EDB-22442 EXPLOIT
exploitdb
访问
CVE Reference: CVE-2003-0161 ADVISORY
cve.org
访问
ExploitDB EDB-24 EXPLOIT
exploitdb
访问
Download Exploit EDB-24 EXPLOIT
exploitdb
访问
CVSS评分详情
10.0
CRITICAL
CVSS向量: AV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS版本: 2.0
机密性
COMPLETE
完整性
COMPLETE
可用性
COMPLETE
时间信息
发布时间:
2003-04-01 05:00:00
修改时间:
2024-08-08 01:43:36
创建时间:
2025-11-11 15:32:18
更新时间:
2026-01-26 02:16:52
利用信息
此漏洞有可利用代码!
利用代码数量: 2
利用来源:
未知 未知
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2003-0161 2025-11-11 15:17:26 2025-11-11 07:32:18
NVD nvd_CVE-2003-0161 2025-11-11 14:50:37 2025-11-11 07:41:05
CNNVD cnnvd_CNNVD-200304-025 2025-11-11 15:08:42 2025-11-11 07:48:51
EXPLOITDB exploitdb_EDB-22442 2025-11-11 15:05:48 2025-11-11 08:17:23
EXPLOITDB exploitdb_EDB-24 2025-11-11 15:05:26 2025-11-11 08:19:52
版本与语言
当前版本: v5
主要语言: EN
支持语言:
EN ZH
其他标识符:
:
:
:
:
安全公告
暂无安全公告信息
变更历史
v5 EXPLOITDB
2025-11-11 16:19:52
references_count: 27 → 29; tags_count: 4 → 7
查看详细变更
  • references_count: 27 -> 29
  • tags_count: 4 -> 7
v4 EXPLOITDB
2025-11-11 16:17:23
references_count: 24 → 27; tags_count: 0 → 4; data_sources: ['cnnvd', 'cve', 'nvd'] → ['cnnvd', 'cve', 'exploitdb', 'nvd']
查看详细变更
  • references_count: 24 -> 27
  • tags_count: 0 -> 4
  • data_sources: ['cnnvd', 'cve', 'nvd'] -> ['cnnvd', 'cve', 'exploitdb', 'nvd']
v3 CNNVD
2025-11-11 15:48:51
vulnerability_type: 未提取 → 授权问题; cnnvd_id: 未提取 → CNNVD-200304-025; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 授权问题
  • cnnvd_id: 未提取 -> CNNVD-200304-025
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:41:05
severity: SeverityLevel.MEDIUM → SeverityLevel.CRITICAL; cvss_score: 未提取 → 10.0; cvss_vector: NOT_EXTRACTED → AV:N/AC:L/Au:N/C:C/I:C/A:C; cvss_version: NOT_EXTRACTED → 2.0; affected_products_count: 0 → 104; references_count: 25 → 24; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • severity: SeverityLevel.MEDIUM -> SeverityLevel.CRITICAL
  • cvss_score: 未提取 -> 10.0
  • cvss_vector: NOT_EXTRACTED -> AV:N/AC:L/Au:N/C:C/I:C/A:C
  • cvss_version: NOT_EXTRACTED -> 2.0
  • affected_products_count: 0 -> 104
  • references_count: 25 -> 24
  • data_sources: ['cve'] -> ['cve', 'nvd']