CVE-1999-1580
— NVD-CWE-Other
- Published: 1995-08-23T04:00:00.000
- Last modified: 2025-04-03T01:03:51.193
- CWE: NVD-CWE-Other
CVE-1999-1580 — SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option. [Weakness: NVD-CWE-Other]
Related CVE by CWE
No related CWE found.
Top CVE for Vendor
No vendor taxonomy on this entry.
Recently Exploited Similar Vulnerabilities
No recent KEV-listed items for this vendor/product.
SunOS sendmail 5.59 through 5.65 uses popen to process a forwarding host argument, which allows local users to gain root privileges by modifying the IFS (Internal Field Separator) variable and passing crafted values to the -oR option.
🧠 Explainer: What this vulnerability means
Summary: This vulnerability affects the product by the vendor (CWE: unspecified).
Impact: Potential impact includes remote code execution, data theft, or denial of service.
Mitigation: Prioritize patching and consider temporary workarounds documented by the vendor.
No vendor/product data yet.
- http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html [Exploit]
- http://www.auscert.org.au/render.html?it=1853&cid=1978 [Vendor Advisory]
- http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul [Patch, Third Party Advisory, US Government Resource]
- http://www.kb.cert.org/vuls/id/3278 [Third Party Advisory, US Government Resource]
- http://www.securityfocus.com/bid/7829 []
- http://www.alw.nih.gov/Security/8lgm/8lgm-Advisory-21.html [Exploit]
- http://www.auscert.org.au/render.html?it=1853&cid=1978 [Vendor Advisory]
- http://www.cert.org/advisories/CA-95.11.sun.sendmail-oR.vul [Patch, Third Party Advisory, US Government Resource]
- http://www.kb.cert.org/vuls/id/3278 [Third Party Advisory, US Government Resource]
- http://www.securityfocus.com/bid/7829 []