Skip to content

Use-after-free vulnerability in Sendmail before 8.13.8...

Moderate severity Unreviewed Published May 1, 2022 to the GitHub Advisory Database • Updated Feb 24, 2024

Package

No package listedSuggest a package

Affected versions

Unknown

Patched versions

Unknown

Description

Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."

References

Published by the National Vulnerability Database Aug 29, 2006
Published to the GitHub Advisory Database May 1, 2022
Last updated Feb 24, 2024

Severity

Moderate

EPSS score

27.435%
(97th percentile)

Weaknesses

CVE ID

CVE-2006-4434

GHSA ID

GHSA-535c-fwmj-7hhw

Source code

No known source code

Dependabot alerts are not supported on this advisory because it does not have a package from a supported ecosystem with an affected and fixed version.

Learn more about GitHub language support

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.