Vulnerability   
Search   
    Search 324607 CVE descriptions
and 146377 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

CVE ID:CVE-2006-4434
Description:Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."
Test IDs: 1.3.6.1.4.1.25623.1.0.57332   1.3.6.1.4.1.25623.1.0.57318   1.3.6.1.4.1.25623.1.0.65157   1.3.6.1.4.1.25623.1.0.57413  
Cross References: Common Vulnerability Exposure (CVE) ID: CVE-2006-4434
BugTraq ID: 19714
http://www.securityfocus.com/bid/19714
Debian Security Information: DSA-1164 (Google Search)
http://www.debian.org/security/2006/dsa-1164
http://www.mandriva.com/security/advisories?name=MDKSA-2006:156
OpenBSD Security Advisory: [3.8] 20060825 010: SECURITY FIX: August 25, 2006
http://www.openbsd.org/errata38.html#sendmail3
OpenBSD Security Advisory: [3.9] 20060825 005: SECURITY FIX: August 25, 2006
http://www.openbsd.org/errata.html#sendmail3
http://www.osvdb.org/28193
http://securitytracker.com/id?1016753
http://secunia.com/advisories/21637
http://secunia.com/advisories/21641
http://secunia.com/advisories/21696
http://secunia.com/advisories/21700
http://secunia.com/advisories/21749
http://secunia.com/advisories/22369
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102664-1
SuSE Security Announcement: SUSE-SR:2006:021 (Google Search)
http://www.novell.com/linux/security/advisories/2006_21_sr.html
http://www.attrition.org/pipermail/vim/2006-August/000999.html
http://www.vupen.com/english/advisories/2006/3393
http://www.vupen.com/english/advisories/2006/3994




© 1998-2025 E-Soft Inc. All rights reserved.