{"id":"CVE-2002-1337","details":"Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.","modified":"2026-04-10T03:33:22.871396Z","published":"2003-03-07T05:00:00Z","references":[{"type":"ADVISORY","url":"ftp://ftp.netbsd.org/pub/NetBSD/security/advisories/NetBSD-SA2003-002.txt.asc"},{"type":"ADVISORY","url":"ftp://patches.sgi.com/support/free/security/advisories/20030301-01-P"},{"type":"ADVISORY","url":"http://frontal2.mandriva.com/security/advisories?name=MDKSA-2003:028"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=104673778105192&w=2"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=104678739608479&w=2"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=104678862109841&w=2"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=104678862409849&w=2"},{"type":"ADVISORY","url":"http://marc.info/?l=bugtraq&m=104679411316818&w=2"},{"type":"ADVISORY","url":"http://www.cert.org/advisories/CA-2003-07.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2003/dsa-257"},{"type":"ADVISORY","url":"http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950"},{"type":"ADVISORY","url":"http://www.kb.cert.org/vuls/id/398025"},{"type":"ADVISORY","url":"http://www.securityfocus.com/bid/6991"},{"type":"ADVISORY","url":"http://www.sendmail.org/8.12.8.html"},{"type":"EVIDENCE","url":"http://www.securityfocus.com/bid/6991"},{"type":"FIX","url":"http://www.cert.org/advisories/CA-2003-07.html"},{"type":"FIX","url":"http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950"},{"type":"FIX","url":"http://www.securityfocus.com/bid/6991"},{"type":"FIX","url":"http://www.sendmail.org/8.12.8.html"},{"type":"WEB","url":"ftp://ftp.sco.com/pub/updates/OpenServer/CSSA-2003-SCO.6"},{"type":"WEB","url":"ftp://ftp.sco.com/pub/updates/UnixWare/CSSA-2003-SCO.5"},{"type":"WEB","url":"http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000571"},{"type":"WEB","url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IY40500&apar=only"},{"type":"WEB","url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IY40501&apar=only"},{"type":"WEB","url":"http://www-1.ibm.com/support/search.wss?rs=0&q=IY40502&apar=only"},{"type":"WEB","url":"http://www.iss.net/issEn/delivery/xforce/alertdetail.jsp?oid=21950"},{"type":"WEB","url":"http://www.iss.net/security_center/static/10748.php"},{"type":"WEB","url":"http://www.kb.cert.org/vuls/id/398025"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2003-073.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2003-074.html"},{"type":"WEB","url":"http://www.redhat.com/support/errata/RHSA-2003-227.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/6991"},{"type":"WEB","url":"http://www.sendmail.org/8.12.8.html"},{"type":"WEB","url":"https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2222"}],"schema_version":"1.7.5"}