Your submission was sent successfully! Close

You have successfully unsubscribed! Close

Thank you for signing up for our newsletter!
In these regular emails you will find the latest updates about Ubuntu and upcoming events where you can meet our team.Close

CVE-2006-4434

Published: 29 August 2006

Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."

Priority

Unknown

Cvss 3 Severity Score

7.5

Score breakdown

Status

Package Release Status
sendmail
Launchpad, Ubuntu, Debian
dapper Ignored
(end of life)
edgy
Released (8.13.8-1)
feisty
Released (8.13.8-1)
gutsy
Released (8.13.8-1)
hardy
Released (8.13.8-1)
intrepid
Released (8.13.8-1)
jaunty
Released (8.13.8-1)
karmic
Released (8.13.8-1)
upstream
Released (8.13.8)

Severity score breakdown

Parameter Value
Base score 7.5
Attack vector Network
Attack complexity Low
Privileges required None
User interaction None
Scope Unchanged
Confidentiality None
Integrity impact None
Availability impact High
Vector CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H