SAMATE Logo NIST Logo The SAMATE Project Department of Homeland Security
Downloads:  Download this Test Case #1298

Back to the previous page... Back to the previous page

Test Case IDCandidate1298
Bad / Good / MixedGoodGood test case
AuthorMIT
Associations
Bad pair: 1297  
Test suite: 88  
Added byMIT
LanguageC
Type of test caseSource Code
Input string
Expected Output
Instructions
Submission date2006-02-09
DescriptionRemote Sendmail Header Processing Vulnerability: CA-2003-07 Patched version. From MIT benchmarks (models/sendmail/s1)

Buffer overflow vulnerability allows remote attackers to execute arbitrary commands by sending e-mails with cleverly formatted address fields related to the sender and recipient header comments.

Patched file: crackaddr-ok.c
Patched line number: 209, 226, 263, 266, 317, 319, 331, 346, 348, 352, 360, 364, 367, 374, 386, 426, 440, 442, 446, 454, 457, 460, 490, 501, 504, 506, 515, 518, 521, 524
File(s)
Flaw

There are no comments
Have any comments on this test case? Please, .


					
				

					
				
File Contains:
CWE-119: Improper Restriction of Operations within the Bounds of a Memory Buffer on line(s): 0