Unrated severityNVD Advisory· Published Jun 7, 2006· Updated Apr 16, 2026
CVE-2006-1173
CVE-2006-1173
Description
Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files.
Affected products
41cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*+ 40 more
- cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:*range: <=8.13.6
- cpe:2.3:a:sendmail:sendmail:8.10:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.10.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.11.7:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.10:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.11:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12.9:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta10:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta12:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta16:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta5:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.12:beta7:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.1.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.3:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.4:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.13.5:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:*
- cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:*
Patches
0No patches discovered yet.
Vulnerability mechanics
AI mechanics synthesis has not run for this CVE yet.
References
56- secunia.com/advisories/15779nvdPatchVendor Advisory
- secunia.com/advisories/20473nvdPatchVendor Advisory
- sunsolve.sun.com/search/document.donvdPatchVendor Advisory
- www.securityfocus.com/bid/18433nvdPatch
- www.sendmail.com/security/advisories/SA-200605-01.txt.ascnvdPatchVendor Advisory
- secunia.com/advisories/20641nvdVendor Advisory
- secunia.com/advisories/20650nvdVendor Advisory
- secunia.com/advisories/20651nvdVendor Advisory
- secunia.com/advisories/20654nvdVendor Advisory
- secunia.com/advisories/20673nvdVendor Advisory
- secunia.com/advisories/20675nvdVendor Advisory
- secunia.com/advisories/20679nvdVendor Advisory
- secunia.com/advisories/20683nvdVendor Advisory
- secunia.com/advisories/20684nvdVendor Advisory
- secunia.com/advisories/20694nvdVendor Advisory
- secunia.com/advisories/20726nvdVendor Advisory
- secunia.com/advisories/20782nvdVendor Advisory
- secunia.com/advisories/21042nvdVendor Advisory
- secunia.com/advisories/21160nvdVendor Advisory
- secunia.com/advisories/21327nvdVendor Advisory
- secunia.com/advisories/21612nvdVendor Advisory
- secunia.com/advisories/21647nvdVendor Advisory
- www.kb.cert.org/vuls/id/146718nvdThird Party AdvisoryUS Government Resource
- www.vupen.com/english/advisories/2006/2389nvdVendor Advisory
- ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-06:17.sendmail.ascnvd
- patches.sgi.com/support/free/security/advisories/20060601-01-Pnvd
- patches.sgi.com/support/free/security/advisories/20060602-01-U.ascnvd
- itrc.hp.com/service/cki/docDisplay.donvd
- lists.suse.com/archive/suse-security-announce/2006-Jun/0006.htmlnvd
- securitytracker.com/idnvd
- slackware.com/security/viewer.phpnvd
- support.avaya.com/elmodocs2/security/ASA-2006-148.htmnvd
- www-1.ibm.com/support/search.wssnvd
- www-1.ibm.com/support/search.wssnvd
- www.debian.org/security/2006/dsa-1155nvd
- www.f-secure.com/security/fsc-2006-5.shtmlnvd
- www.fortinet.com/FortiGuardCenter/advisory/FG-2006-18.htmlnvd
- www.gentoo.org/security/en/glsa/glsa-200606-19.xmlnvd
- www.mandriva.com/security/advisoriesnvd
- www.openbsd.org/errata38.htmlnvd
- www.osvdb.org/26197nvd
- www.redhat.com/support/errata/RHSA-2006-0515.htmlnvd
- www.securityfocus.com/archive/1/437928/100/0/threadednvd
- www.securityfocus.com/archive/1/438241/100/0/threadednvd
- www.securityfocus.com/archive/1/438330/100/0/threadednvd
- www.securityfocus.com/archive/1/440744/100/0/threadednvd
- www.securityfocus.com/archive/1/442939/100/0/threadednvd
- www.vupen.com/english/advisories/2006/2189nvd
- www.vupen.com/english/advisories/2006/2351nvd
- www.vupen.com/english/advisories/2006/2388nvd
- www.vupen.com/english/advisories/2006/2390nvd
- www.vupen.com/english/advisories/2006/2798nvd
- www.vupen.com/english/advisories/2006/3135nvd
- exchange.xforce.ibmcloud.com/vulnerabilities/27128nvd
- issues.rpath.com/browse/RPL-526nvd
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11253nvd
News mentions
0No linked articles in our index yet.