OpenPKG CVS Repository
http://cvs.openpkg.org/
____________________________________________________________________________
Server: cvs.openpkg.org Name: Ralf S. Engelschall
Root: /e/openpkg/cvs Email: [EMAIL PROTECTED]
Module: openpkg-web Date: 30-Mar-2003 13:48:16
Branch: HEAD Handle: 2003033012481500
Modified files:
openpkg-web/security OpenPKG-SA-2003.027-sendmail.txt
Log:
more polishing and inclusion of disclosers name
Summary:
Revision Changes Path
1.4 +20 -17 openpkg-web/security/OpenPKG-SA-2003.027-sendmail.txt
____________________________________________________________________________
patch -p0 <<'@@ .'
Index: openpkg-web/security/OpenPKG-SA-2003.027-sendmail.txt
============================================================================
$ cvs diff -u -r1.3 -r1.4 OpenPKG-SA-2003.027-sendmail.txt
--- openpkg-web/security/OpenPKG-SA-2003.027-sendmail.txt 30 Mar 2003 11:34:12
-0000 1.3
+++ openpkg-web/security/OpenPKG-SA-2003.027-sendmail.txt 30 Mar 2003 11:48:15
-0000 1.4
@@ -18,24 +18,26 @@
Dependent Packages: none
Description:
- According to a message on BugTraq [1], a buffer overflow vulnerability
- exists in all version of the Sendmail MTA [0] earlier than 8.12.9.
- Attackers may remotely exploit this vulnerability to gain "root"
- or superuser control of any vulnerable Sendmail server. The Common
- Vulnerabilities and Exposures (CVE) project assigned the id
- CAN-2003-0161 [2] to the problem.
+ Michal Zalewski discovered [1] a confirmed [2] buffer overflow
+ vulnerability in all version of the Sendmail [0] MTA earlier than
+ 8.12.9. The mail address parser performs insufficient bounds checking
+ in certain conditions due to a data type conversion, making it
+ possible for an attacker to take control of the application. Attackers
+ may remotely exploit this vulnerability to gain "root" access of any
+ vulnerable Sendmail server. The Common Vulnerabilities and Exposures
+ (CVE) project assigned the id CAN-2003-0161 [3] to the problem.
Please check whether you are affected by running "<prefix>/bin/rpm
-q sendmail". If you have the "sendmail" package installed and its
version is affected (see above), we recommend that you immediately
upgrade it (see Solution) and it's dependent packages (see above), if
- any, too. [3][4]
+ any, too. [4][5]
Solution:
Select the updated source RPM appropriate for your OpenPKG release
- [5], fetch it from the OpenPKG FTP service [6] or a mirror location,
- verify its integrity [7], build a corresponding binary RPM from it [3]
- and update your OpenPKG installation by applying the binary RPM [4].
+ [6], fetch it from the OpenPKG FTP service [7] or a mirror location,
+ verify its integrity [8], build a corresponding binary RPM from it [4]
+ and update your OpenPKG installation by applying the binary RPM [5].
For the current release OpenPKG 1.2, perform the following operations
to permanently fix the security problem (for other releases adjust
accordingly).
@@ -53,13 +55,14 @@
References:
[0] http://www.sendmail.org/
- [1] http://www.securityfocus.com/archive/1/316760/2003-03-26/2003-04-01/0
- [2] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0161
- [3] http://www.openpkg.org/tutorial.html#regular-source
- [4] http://www.openpkg.org/tutorial.html#regular-binary
- [5] ftp://ftp.openpkg.org/release/1.2/UPD/sendmail-8.12.7-1.2.2.src.rpm
- [6] ftp://ftp.openpkg.org/release/1.2/UPD/
- [7] http://www.openpkg.org/security.html#signature
+ [1] http://lists.netsys.com/pipermail/full-disclosure/2003-March/008973.html
+ [2] http://www.securityfocus.com/archive/1/316760/2003-03-26/2003-04-01/0
+ [3] http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0161
+ [4] http://www.openpkg.org/tutorial.html#regular-source
+ [5] http://www.openpkg.org/tutorial.html#regular-binary
+ [6] ftp://ftp.openpkg.org/release/1.2/UPD/sendmail-8.12.7-1.2.2.src.rpm
+ [7] ftp://ftp.openpkg.org/release/1.2/UPD/
+ [8] http://www.openpkg.org/security.html#signature
________________________________________________________________________
For security reasons, this advisory was digitally signed with the
@@ .
______________________________________________________________________
The OpenPKG Project www.openpkg.org
CVS Repository Commit List [EMAIL PROTECTED]