Description: | Summary: The remote host is missing an update for the 'sendmail' package(s) announced via the SSA:2006-166-01 advisory.
Vulnerability Insight: New sendmail packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix a possible denial-of-service issue.
Sendmail's complete advisory may be found here: [link moved to references]
Sendmail has also provided an FAQ about this issue: [link moved to references]
The CVE entry for this issue may be found here: [link moved to references]
Here are the details from the Slackware 10.2 ChangeLog: +--------------------------+ patches/packages/sendmail-8.13.7-i486-1_slack10.2.tgz: Upgraded to sendmail-8.13.7. Fixes a potential denial of service problem caused by excessive recursion leading to stack exhaustion when attempting delivery of a malformed MIME message. This crashes sendmail's queue processing daemon, which in turn can lead to two problems: depending on the settings, these crashed processes may create coredumps which could fill a drive partition, and such a malformed message in the queue will cause queue processing to cease when the message is reached, causing messages that are later in the queue to not be processed. Sendmail's complete advisory may be found here: [link moved to references] Sendmail has also provided an FAQ about this issue: [link moved to references] The CVE entry for this issue may be found here: [link moved to references] (* Security fix *) patches/packages/sendmail-cf-8.13.7-noarch-1_slack10.2.tgz: Upgraded to sendmail-8.13.7 configs. +--------------------------+
Affected Software/OS: 'sendmail' package(s) on Slackware 8.1, Slackware 9.0, Slackware 9.1, Slackware 10.0, Slackware 10.1, Slackware 10.2, Slackware current.
Solution: Please install the updated package(s).
CVSS Score: 5.0
CVSS Vector: AV:N/AC:L/Au:N/C:N/I:N/A:P
|