Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.51401
Kategorie:Conectiva Local Security Checks
Titel:Conectiva Security Advisory CLA-2003:614
Zusammenfassung:NOSUMMARY
Beschreibung:Description:

The remote host is missing updates announced in
advisory CLA-2003:614.

Sendmail[1] is a widely used Mail Transfer Agent (MTA).

Michal Zalewski reported[6] a remote vulnerability[5] in sendmail
versions 8.12.8 and below. The vulnerability lies in the address
parser which performs insufficient bounds checking in certain
conditions due to a char to int conversion.

It is believed to be possible for remote attackers to cause a Denial
of Service condition and to even execute arbitrary commands with the
same permissions under which the sendmail daemon runs, which is
root.

The sendmail authors have released a new version[2], 8.12.9, which
fixes this vulnerability. They have also made available patches[3]
for older versions, which the packages provided via this announcement
contain.

Starting with Conectiva Linux 7.0, sendmail is no longer the default
mail server and has been replaced with Postfix. But sendmail is still
shipped in all Conectiva Linux versions.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:614
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : Critical

CVSS Score:
10.0

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2003-0161
BugTraq ID: 7230
http://www.securityfocus.com/bid/7230
Bugtraq: 20030329 Sendmail: -1 gone wild (Google Search)
http://marc.info/?l=bugtraq&m=104897487512238&w=2
Bugtraq: 20030329 sendmail 8.12.9 available (Google Search)
http://marc.info/?l=bugtraq&m=104896621106790&w=2
Bugtraq: 20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail) (Google Search)
http://marc.info/?l=bugtraq&m=104914999806315&w=2
Bugtraq: 20030331 GLSA: sendmail (200303-27) (Google Search)
http://www.securityfocus.com/archive/1/316961/30/25250/threaded
Bugtraq: 20030401 Immunix Secured OS 7+ openssl update (Google Search)
http://www.securityfocus.com/archive/1/317135/30/25220/threaded
Bugtraq: 20030520 [Fwd: 127 Research and Development: 127 Day!] (Google Search)
http://www.securityfocus.com/archive/1/321997
Caldera Security Advisory: CSSA-2003-016.0
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt
http://www.cert.org/advisories/CA-2003-12.html
CERT/CC vulnerability note: VU#897604
http://www.kb.cert.org/vuls/id/897604
Conectiva Linux advisory: CLA-2003:614
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000614
Debian Security Information: DSA-278 (Google Search)
http://www.debian.org/security/2003/dsa-278
Debian Security Information: DSA-290 (Google Search)
http://www.debian.org/security/2003/dsa-290
FreeBSD Security Advisory: FreeBSD-SA-03:07
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc
http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html
http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml
HPdes Security Advisory: SSRT3531
Immunix Linux Advisory: IMNX-2003-7+-002-01
http://www.redhat.com/support/errata/RHSA-2003-120.html
http://www.redhat.com/support/errata/RHSA-2003-121.html
SCO Security Bulletin: SCOSA-2004.11
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt
SGI Security Advisory: 20030401-01-P
ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1
SuSE Security Announcement: SuSE-SA:2003:023 (Google Search)
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.