CVE-2014-3956
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
04/06/2014
Last modified:
12/04/2025
Description
The sm_close_on_exec function in conf.c in sendmail before 8.14.9 has arguments in the wrong order, and consequently skips setting expected FD_CLOEXEC flags, which allows local users to access unintended high-numbered file descriptors via a custom mail-delivery program.
Impact
Base Score 2.0
1.90
Severity 2.0
LOW
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:o:freebsd:freebsd:*:-:*:*:*:*:*:* | 9.2 (including) | |
| cpe:2.3:a:hp:hpux:*:*:*:*:*:*:*:* | b.11.31 (including) | |
| cpe:2.3:o:fedoraproject:fedora:20:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sendmail:sendmail:*:*:*:*:*:*:*:* | 8.14.8 (including) | |
| cpe:2.3:a:sendmail:sendmail:8.6.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sendmail:sendmail:8.7.6:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sendmail:sendmail:8.7.7:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sendmail:sendmail:8.7.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sendmail:sendmail:8.7.9:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sendmail:sendmail:8.7.10:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sendmail:sendmail:8.8.8:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sendmail:sendmail:8.9.0:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sendmail:sendmail:8.9.1:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sendmail:sendmail:8.9.2:*:*:*:*:*:*:* | ||
| cpe:2.3:a:sendmail:sendmail:8.9.3:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES
- http://advisories.mageia.org/MGASA-2014-0270.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html
- http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html
- http://secunia.com/advisories/57455
- http://secunia.com/advisories/58628
- http://security.gentoo.org/glsa/glsa-201412-32.xml
- http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A147
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A128
- http://www.securityfocus.com/bid/67791
- http://www.securitytracker.com/id/1030331
- http://www.sendmail.com/sm/open_source/download/8.14.9/
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368
- ftp://ftp.sendmail.org/pub/sendmail/RELEASE_NOTES
- http://advisories.mageia.org/MGASA-2014-0270.html
- http://lists.fedoraproject.org/pipermail/package-announce/2014-June/134349.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00032.html
- http://lists.opensuse.org/opensuse-updates/2014-06/msg00033.html
- http://packetstormsecurity.com/files/126975/Slackware-Security-Advisory-sendmail-Updates.html
- http://secunia.com/advisories/57455
- http://secunia.com/advisories/58628
- http://security.gentoo.org/glsa/glsa-201412-32.xml
- http://www.freebsd.org/security/advisories/FreeBSD-SA-14%3A11.sendmail.asc
- http://www.mandriva.com/security/advisories?name=MDVSA-2014%3A147
- http://www.mandriva.com/security/advisories?name=MDVSA-2015%3A128
- http://www.securityfocus.com/bid/67791
- http://www.securitytracker.com/id/1030331
- http://www.sendmail.com/sm/open_source/download/8.14.9/
- http://www.slackware.com/security/viewer.php?l=slackware-security&y=2014&m=slackware-security.728644
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05216368



