SMTP: Sendmail: Address Prescan Memory Corruption Attack
This signature detects attempts to exploit a known vulnerability in Sendmail SMTP server versions prior to 8.12.9. Because the prescan() procedure that processes e-mail addresses in SMTP headers does not perform some char and int conversions correctly, attackers can send a malicously crafted request to corrupt the Address Prescan Memory on a Sendmail SMTP server and execute arbitrary code.
Extended Description
A vulnerability in Sendmail may be exploited remotely to execute arbitrary code. The flaw is present in the 'prescan()' procedure, which is used for processing email addresses in SMTP headers. This condition has been confirmed to be exploitable by remote attackers to execute instructions on target systems. This vulnerability stems from a logic error in the conversion of a char to an integer value. The issue has been fixed Sendmail 8.12.9.
Affected Products
Sun lx50,Hp mpe/ix
srx-branch-12.3
srx-19.3
srx-branch-19.3
vsrx3bsd-19.2
srx-branch-19.4
vsrx-19.4
mx-12.3
mx-19.4
vmx-19.4
mx-19.3
vsrx3bsd-19.4
srx-19.4
vsrx-12.3
vmx-19.3
vsrx-19.2
srx-12.3
Red_hat
Sco
Apple
Sun
Hp
Sendmail,_inc
Ibm
Sgi
Sendmail_consortium
Netbsd
Compaq
10.0