Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.51460
Category:Conectiva Local Security Checks
Title:Conectiva Security Advisory CLA-2003:742
Summary:NOSUMMARY
Description:Description:

The remote host is missing updates announced in
advisory CLA-2003:742.

Sendmail[1] is a widely used Mail Transfer Agent (MTA).

Michal Zalewski reported[2] a remote vulnerability[3] in sendmail
versions 8.12.9 and earlier. The problem resides in the address
parsing code and can be exploited to execute arbitrary code in the
context of the server. The Common Vulnerabilities and Exposures
project (cve.mitre.org) has assigned the name CVE-2003-0694 to this
issue[4].

The sendmail authors have released a new version[5], 8.12.10, which
fixes this vulnerability. They have also made available a patch[6]
for older versions, which the packages provided via this announcement
contain.

This update also includes fixes for a buffer overflow vulnerability
in the ruleset parsing code. This vulnerability is not exploitable in
the default configuration and requires the use of non-standard
rulesets recipients. The Common Vulnerabilities and Exposures project
(cve.mitre.org) has assigned the name CVE-2003-0681 to this
issue[7].

Starting with Conectiva Linux 7.0, sendmail is no longer the default
mail server and has been replaced with Postfix (but sendmail is still
shipped with all Conectiva Linux versions).


Solution:
The apt tool can be used to perform RPM package upgrades
by running 'apt-get update' followed by 'apt-get upgrade'

http://www.sendmail.org/
http://www.securityfocus.com/archive/1/337839
http://www.kb.cert.org/vuls/id/784980
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0694
http://www.sendmail.org/8.12.10.html
http://www.sendmail.org/parse8.359.2.8.html
http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2003-0681
http://www.securityspace.com/smysecure/catid.html?in=CLA-2003:742
http://distro.conectiva.com.br/atualizacoes/index.php?id=a&anuncio=002003

Risk factor : Critical

CVSS Score:
10.0

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2003-0694
Bugtraq: 20030917 GLSA: sendmail (200309-13) (Google Search)
http://marc.info/?l=bugtraq&m=106383437615742&w=2
Bugtraq: 20030917 Sendmail 8.12.9 prescan bug (a new one) [CAN-2003-0694] (Google Search)
http://marc.info/?l=bugtraq&m=106381604923204&w=2
Bugtraq: 20030917 [slackware-security] Sendmail vulnerabilities fixed (SSA:2003-260-02) (Google Search)
http://marc.info/?l=bugtraq&m=106382859407683&w=2
Bugtraq: 20030919 [OpenPKG-SA-2003.041] OpenPKG Security Advisory (sendmail) (Google Search)
http://marc.info/?l=bugtraq&m=106398718909274&w=2
http://www.cert.org/advisories/CA-2003-25.html
CERT/CC vulnerability note: VU#784980
http://www.kb.cert.org/vuls/id/784980
Conectiva Linux advisory: CLA-2003:742
http://distro.conectiva.com.br/atualizacoes/?id=a&anuncio=000742
Debian Security Information: DSA-384 (Google Search)
http://www.debian.org/security/2003/dsa-384
FreeBSD Security Advisory: FreeBSD-SA-03:13
http://archives.neohapsis.com/archives/fulldisclosure/2003-q3/4119.html
HPdes Security Advisory: SSRT3631
Immunix Linux Advisory: IMNX-2003-7+-021-01
http://www.mandriva.com/security/advisories?name=MDKSA-2003:092
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A2975
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A572
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A603
http://www.redhat.com/support/errata/RHSA-2003-283.html
http://www.redhat.com/support/errata/RHSA-2003-284.html
SCO Security Bulletin: CSSA-2003-036.0
SCO Security Bulletin: SCOSA-2004.11
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt
http://archives.neohapsis.com/archives/vulnwatch/2003-q3/0113.html
Common Vulnerability Exposure (CVE) ID: CVE-2003-0681
BugTraq ID: 8649
http://www.securityfocus.com/bid/8649
CERT/CC vulnerability note: VU#108964
http://www.kb.cert.org/vuls/id/108964
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A3606
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A595
XForce ISS Database: sendmail-ruleset-parsing-bo(13216)
https://exchange.xforce.ibmcloud.com/vulnerabilities/13216
CopyrightCopyright (c) 2005 E-Soft Inc. http://www.securityspace.com

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.