-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

National Cyber Alert System

                Technical Cyber Security Alert TA06-081A


Sendmail Race Condition Vulnerability

  Original release date: March 22, 2006
  Last revised: --
  Source: US-CERT


Systems Affected

  Sendmail versions prior to 8.13.6.


Overview

  A race condition in Sendmail may allow a remote attacker to execute
  arbitrary code.


I. Description

  Sendmail contains a race condition caused by the improper handling of
  asynchronous signals. In particular, by forcing the SMTP server to
  have an I/O timeout at exactly the correct instant, an attacker may be
  able to execute arbitrary code with the privileges of the Sendmail
  process.

  Details, including statements from affected vendors are available in
  the following Vulnerability Note:
  VU#834865 - Sendmail contains a race condition
  A race condition in Sendmail may allow a remote attacker to execute
  arbitrary code.
  (CVE-2006-0058)

  Please refer to the Sendmail MTA Security Vulnerability Advisory and
  the Sendmail version 8.13.6 release page for more information.


II. Impact

  A remote, unauthenticated attacker could execute arbitrary code with
  the privileges of the Sendmail process. If Sendmail is running as
  root, the attacker could take complete control of an affected system.


III. Solution

Upgrade Sendmail

  Sendmail version 8.13.6 has been released to correct this issue. In
  addition to VU#834865, Sendmail 8.13.6 addresses other security issues
  and potential weaknesses in the Sendmail code.

  Patches to correct this issue in Sendmail versions 8.12.11 and 8.13.5
  are also available.


Appendix A. References

    * US-CERT Vulnerability Note VU#834865 -
      <http://www.kb.cert.org/vuls/id/834865>

    * Sendmail version 8.13.6 - <http://www.sendmail.org/8.13.6.html>

    * Sendmail MTA Security Vulnerability Advisory -
      <http://www.sendmail.com/company/advisory>

    * Sendmail version 8.12.11 Patch -
      <ftp://ftp.sendmail.org/pub/sendmail/8.12.11.p0>

    * Sendmail version 8.13.5 Patch -
      <ftp://ftp.sendmail.org/pub/sendmail/8.13.5.p0>

    * CVE-2006-0058 -
      <http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2006-0058>


____________________________________________________________________

  The most recent version of this document can be found at:

    <http://www.us-cert.gov/cas/techalerts/TA06-081A.html>
____________________________________________________________________

  Feedback can be directed to US-CERT Technical Staff. Please send
  email to <[EMAIL PROTECTED]> with "TA06-081A Feedback VU#834865" in the
  subject.
____________________________________________________________________

  For instructions on subscribing to or unsubscribing from this
  mailing list, visit <http://www.us-cert.gov/cas/signup.html>.
____________________________________________________________________

  Produced 2006 by US-CERT, a government organization.

  Terms of use:

    <http://www.us-cert.gov/legal.html>
____________________________________________________________________


Revision History

  Mar 22, 2006: Initial release

-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iQEVAwUBRCGC0X0pj593lg50AQLczAf+NzjAlt+FR5QXIayFTYL3RPVXuVU8RYtp
i4a62FbF6bDQkVJZwWqusa1XCOaAk2HhIYbYHt2RDIKyXU8PlIs1VjtKCMzhfhNE
HyJfBhfCJycU0udMsoH1IorH9bves2Ubog+mLS/eGMCcgNUJ+z3P/U8KukZfeRJi
5+jGrqksuz342XlI/9vKc9x3ateUrAyS2plbWc8wzxiG/T82hO7fCxz9mnd1V6zM
Ub2iFAIpAbBhvEJOt7/IHxnmED/YaFF6JWbvWrZxXkLpcLFNKTN7j4pyX4ymqPmk
rSoSXeCb5cc2ARBCyfsLY5+i96BxV0RgfcBXbT9mRjv7die16AoTXQ==
=7/71
-----END PGP SIGNATURE-----

_______________________________________________
NOTE: If there is a disclaimer or other legal boilerplate in the above
message, it is NULL AND VOID.  You may ignore it.

Visit http://www.mimedefang.org and http://www.roaringpenguin.com
MIMEDefang mailing list [email protected]
http://lists.roaringpenguin.com/mailman/listinfo/mimedefang

Reply via email to