exploit the possibilities
Home Files News &[SERVICES_TAB]About Contact Add New
Showing 1 - 4 of 4 RSS Feed

CVE-2006-0058

Status Candidate

Overview

Signal handler race condition in Sendmail 8.13.x before 8.13.6 allows remote attackers to execute arbitrary code by triggering timeouts in a way that causes the setjmp and longjmp function calls to be interrupted and modify unexpected memory locations.

Related Files

rbl4ck_sendmail.tgz
Posted Jul 24, 2006
Authored by redsand | Site blacksecurity.org

Remote signal handling exploit for Sendmail versions 8.13.5 and below.

tags | exploit, remote
advisories | CVE-2006-0058
SHA-256 | 85f87239559b74cd612452fda856576a82c5d997226da3905198f846a9f1c48f
SCOSA-2006.24.txt
Posted May 24, 2006
Authored by SCO | Site sco.com

SCO Security Advisory SCOSA-2006.24 - Sendmail could allow a remote attacker to execute arbitrary code as root, caused by a signal race vulnerability.

tags | advisory, remote, arbitrary, root
advisories | CVE-2006-0058
SHA-256 | 14c7c5f6be311b1f1a1ef703c8b555ed330c3caf171aead875300fd4a9ef3395
HP Security Bulletin 2006-11.33
Posted May 22, 2006
Authored by Hewlett Packard | Site hp.com

HP Security Bulletin - A vulnerability has been identified in Sendmail which may allow a remote attacker to execute arbitrary code.

tags | advisory, remote, arbitrary
advisories | CVE-2006-0058
SHA-256 | c4aa87665ea964bf5390f12fa0caa35e086e16afc4f14fc2f57d1291216c90d9
sendmail0058.txt
Posted Mar 28, 2006
Site sendmail.com

Sendmail, Inc. has recently become aware of a security vulnerability in certain versions of sendmail Mail Transfer Agent (MTA) and UNIX and Linux products that contain it. Sendmail was notified by security researchers at ISS that, under some specific timing conditions, this vulnerability may permit a specifically crafted attack to take over the sendmail MTA process, allowing remote attackers to execute commands and run arbitrary programs on the system running the MTA, affecting email delivery, or tampering with other programs and data on this system. Versions 8.13.5 and below are affected.

tags | advisory, remote, arbitrary
systems | linux, unix
advisories | CVE-2006-0058
SHA-256 | 3b3c6adcf605a2b27d8b8cb962869671376f087868fa32c5b883c8b5c1bddf16
Page 1 of 1
Back1Next

File Archive:

April 2024

  • Su
  • Mo
  • Tu
  • We
  • Th
  • Fr
  • Sa
  • 1
    Apr 1st
    10 Files
  • 2
    Apr 2nd
    26 Files
  • 3
    Apr 3rd
    40 Files
  • 4
    Apr 4th
    6 Files
  • 5
    Apr 5th
    26 Files
  • 6
    Apr 6th
    0 Files
  • 7
    Apr 7th
    0 Files
  • 8
    Apr 8th
    22 Files
  • 9
    Apr 9th
    14 Files
  • 10
    Apr 10th
    10 Files
  • 11
    Apr 11th
    13 Files
  • 12
    Apr 12th
    14 Files
  • 13
    Apr 13th
    0 Files
  • 14
    Apr 14th
    0 Files
  • 15
    Apr 15th
    30 Files
  • 16
    Apr 16th
    10 Files
  • 17
    Apr 17th
    22 Files
  • 18
    Apr 18th
    45 Files
  • 19
    Apr 19th
    8 Files
  • 20
    Apr 20th
    0 Files
  • 21
    Apr 21st
    0 Files
  • 22
    Apr 22nd
    11 Files
  • 23
    Apr 23rd
    68 Files
  • 24
    Apr 24th
    23 Files
  • 25
    Apr 25th
    0 Files
  • 26
    Apr 26th
    0 Files
  • 27
    Apr 27th
    0 Files
  • 28
    Apr 28th
    0 Files
  • 29
    Apr 29th
    0 Files
  • 30
    Apr 30th
    0 Files

Top Authors In Last 30 Days

File Tags

Systems

packet storm

© 2022 Packet Storm. All rights reserved.

Services
Security Services
Hosting By
Rokasec
close