CVE-1999-0095

Current Description

The debug command in Sendmail is enabled, allowing attackers to execute commands as root.

Basic Data

PublishedOctober 01, 1988
Last ModifiedJune 11, 2019
Assignercve@mitre.org
Data TypeCVE
Data FormatMITRE
Data Version4.0
Problem TypeNVD-CWE-Other
CVE Data Version4.0

Base Metric V2

CVSS 2 - Version2.0
CVSS 2 - Vector StringAV:N/AC:L/Au:N/C:C/I:C/A:C
CVSS 2 - Access VectorNETWORK
CVSS 2 - Access ComplexityLOW
CVSS 2 - AuthenticationNONE
CVSS 2 - Confidentiality ImpactCOMPLETE
CVSS 2 - Availability ImpactCOMPLETE
CVSS 2 - Base Score10.0
SeverityHIGH
Exploitability Score10.0
Impact Score10.0
Obtain All Privilegetrue
Obtain User Privilegefalse
Obtain Other Privilegefalse

Base Metric V3

No data provided.

Configurations

  • OR - Configuration 1
    Cpe VersionPartVendorProductVersionUpdateEditionLanguageSW EditionTarget SWTarget HWOtherVersion Start IncludingVersion End IncludingVersion Start ExcludingVersion End Excluding
    2.3ApplicationEric AllmanSendmail5.58*******

Vulnerable Software List

VendorProductVersions
Eric Allman Sendmail 5.58

References

NameSourceURLTags
20190611 The Return of the WIZard: RCE in Exim (CVE-2019-10149)http://seclists.org/fulldisclosure/2019/Jun/16FULLDISC
[oss-security] 20190605 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploithttp://www.openwall.com/lists/oss-security/2019/06/05/4MLIST
[oss-security] 20190606 Re: CVE-2019-10149: Exim 4.87 to 4.91: possible remote exploithttp://www.openwall.com/lists/oss-security/2019/06/06/1MLIST
195http://www.osvdb.org/195OSVDB
1http://www.securityfocus.com/bid/1BID