Remote signal handling exploit for Sendmail versions 8.13.5 and below.
85f87239559b74cd612452fda856576a82c5d997226da3905198f846a9f1c48f
SCO Security Advisory SCOSA-2006.24 - Sendmail could allow a remote attacker to execute arbitrary code as root, caused by a signal race vulnerability.
14c7c5f6be311b1f1a1ef703c8b555ed330c3caf171aead875300fd4a9ef3395
HP Security Bulletin - A vulnerability has been identified in Sendmail which may allow a remote attacker to execute arbitrary code.
c4aa87665ea964bf5390f12fa0caa35e086e16afc4f14fc2f57d1291216c90d9
Sendmail, Inc. has recently become aware of a security vulnerability in certain versions of sendmail Mail Transfer Agent (MTA) and UNIX and Linux products that contain it. Sendmail was notified by security researchers at ISS that, under some specific timing conditions, this vulnerability may permit a specifically crafted attack to take over the sendmail MTA process, allowing remote attackers to execute commands and run arbitrary programs on the system running the MTA, affecting email delivery, or tampering with other programs and data on this system. Versions 8.13.5 and below are affected.
3b3c6adcf605a2b27d8b8cb962869671376f087868fa32c5b883c8b5c1bddf16