Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51401
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2003:614
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory CLA-2003:614.

Sendmail[1] is a widely used Mail Transfer Agent (MTA).

Michal Zalewski reported[6] a remote vulnerability[5] in sendmail
versions 8.12.8 and below. The vulnerability lies in the address
parser which performs insufficient bounds checking in certain
conditions due to a char to int conversion.

It is believed to be possible for remote attackers to cause a Denial
of Service condition and to even execute arbitrary commands with the
same permissions under which the sendmail daemon runs, which is
root.

The sendmail authors have released a new version[2], 8.12.9, which
fixes this vulnerability. They have also made available patches[3]
for older versions, which the packages provided via this announcement
contain.

Starting with Conectiva Linux 7.0, sendmail is no longer the default
mail server and has been replaced with Postfix. But sendmail is still
shipped in all Conectiva Linux versions.


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:614
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0161
BugTraq ID: 7230
http://www.securityfocus.com/bid/7230
Bugtraq: 20030329 Sendmail: -1 gone wild (Google Search)
http://marc.info/?l=bugtraq&m=104897487512238&w=2
Bugtraq: 20030329 sendmail 8.12.9 available (Google Search)
http://marc.info/?l=bugtraq&m=104896621106790&w=2
Bugtraq: 20030330 [OpenPKG-SA-2003.027] OpenPKG Security Advisory (sendmail) (Google Search)
http://marc.info/?l=bugtraq&m=104914999806315&w=2
Bugtraq: 20030331 GLSA: sendmail (200303-27) (Google Search)
http://www.securityfocus.com/archive/1/316961/30/25250/threaded
Bugtraq: 20030401 Immunix Secured OS 7+ openssl update (Google Search)
http://www.securityfocus.com/archive/1/317135/30/25220/threaded
Bugtraq: 20030520 [Fwd: 127 Research and Development: 127 Day!] (Google Search)
http://www.securityfocus.com/archive/1/321997
Caldera Security Advisory: CSSA-2003-016.0
ftp://ftp.caldera.com/pub/security/OpenLinux/CSSA-2003-016.0.txt
http://www.cert.org/advisories/CA-2003-12.html
CERT/CC vulnerability note: VU#897604
http://www.kb.cert.org/vuls/id/897604
Conectiva Linux advisory: CLA-2003:614
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000614
Debian Security Information: DSA-278 (Google Search)
http://www.debian.org/security/2003/dsa-278
Debian Security Information: DSA-290 (Google Search)
http://www.debian.org/security/2003/dsa-290
FreeBSD Security Advisory: FreeBSD-SA-03:07
ftp://ftp.freebsd.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:07.sendmail.asc
http://lists.grok.org.uk/pipermail/full-disclosure/2003-March/004295.html
http://www.gentoo.org/security/en/glsa/glsa-200303-27.xml
HPdes Security Advisory: SSRT3531
Immunix Linux Advisory: IMNX-2003-7+-002-01
http://www.redhat.com/support/errata/RHSA-2003-120.html
http://www.redhat.com/support/errata/RHSA-2003-121.html
SCO Security Bulletin: SCOSA-2004.11
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt
SGI Security Advisory: 20030401-01-P
ftp://patches.sgi.com/support/free/security/advisories/20030401-01-P
http://sunsolve.sun.com/search/document.do?assetkey=1-77-1001088.1-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-52620-1
http://sunsolve.sun.com/search/document.do?assetkey=1-26-52700-1
SuSE Security Announcement: SuSE-SA:2003:023 (Google Search)
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.