漏洞信息
尽管我们使用了先进的大模型技术,但其输出仍可能包含不准确或过时的信息。神龙努力确保数据的准确性,但请您根据实际情况进行核实和判断。
漏洞
N/A
漏洞信息
Use-after-free vulnerability in Sendmail before 8.13.8 allows remote attackers to cause a denial of service (crash) via a long "header line", which causes a previously freed variable to be referenced. NOTE: the original developer has disputed the severity of this issue, saying "The only denial of service that is possible here is to fill up the disk with core dumps if the OS actually generates different core dumps (which is unlikely)... the bug is in the shutdown code (finis()) which leads directly to exit(3), i.e., the process would terminate anyway, no mail delivery or receiption is affected."
漏洞信息
N/A
漏洞
N/A
漏洞
Sendmail超长邮件头释放后使用(use-after-free)漏洞
漏洞信息
Sendmail 8.13.8之前版本中存在释放后使用(use-after-free)漏洞,远程攻击者可借助使用一个超长"标题行"导致以前释放的变量被引用,从而触发拒绝服务攻击(崩溃)。注:原开发人员对此问题的严重性存在争议,表明唯一的拒绝服务攻击可能在于,如果操作系统产生了不同的内存转储(这种情况不太可能发生),则内存转储会填满磁盘空间。此问题存在于直接导致exit(3)的关闭(shutdown)代码 (finis()) 中,也就是终止进程,邮件发送或接收不会受到影响。
漏洞信息
N/A
漏洞
N/A