Sendmail 8.9.0 through 8.12.6 allows remote attackers to bypass relaying restrictions enforced by the 'check_relay' function by spoofing a blank DNS hostname.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6892 | vdb entry signature |
http://www.sendmail.org/8.12.7.html | patch vendor advisory |
http://www.vupen.com/english/advisories/2009/3539 | vdb entry vendor advisory |
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A8512 | vdb entry signature |
http://securitytracker.com/id?1005748 | vdb entry patch |
ftp://patches.sgi.com/support/free/security/advisories/20030101-01-P | vendor advisory |
http://www.securityfocus.com/bid/6548 | vdb entry patch |
https://exchange.xforce.ibmcloud.com/vulnerabilities/10775 | vdb entry |
http://secunia.com/advisories/7826 | third party advisory vendor advisory |