SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Sendmail Vendors:   Sendmail Consortium
(Gentoo Issues Fix) Re: Sendmail Ruleset Buffer Overflow Has Unspecified Impact
SecurityTracker Alert ID:  1007759
SecurityTracker URL:  http://securitytracker.com/id/1007759
CVE Reference:   CVE-2003-0681   (Links to External Site)
Date:  Sep 19 2003
Impact:   Not specified
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 8.12.9 and prior versions
Description:   A buffer overflow vulnerability was reported in Sendmail in certain non-default configurations. The impact was not reported.

It is reported that if non-standard recipient (2), final (4), or mailer-specific envelope rulesets are enabled, a potential buffer overflow may occur. The overflow reportedly exists in the ruleset parsing process.

The default configuration is reported to be not vulnerable.

Timo Sirainen is credited with reporting this flaw.

Impact:   The impact was not disclosed.
Solution:   Gentoo has issued a fix and recommends that all Gentoo Linux users running net-mail/sendmail upgrade to sendmail-8.2.10 as follows:

emerge sync
emerge sendmail
emerge clean

Vendor URL:  www.sendmail.org/8.12.10.html (Links to External Site)
Cause:   Boundary error
Underlying OS:  Linux (Gentoo)

Message History:   This archive entry is a follow-up to the message listed below.
Sep 18 2003 Sendmail Ruleset Buffer Overflow Has Unspecified Impact



 Source Message Contents

Subject:  [gentoo-announce] GLSA: sendmail (200309-13)


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

- - - ---------------------------------------------------------------------
GENTOO LINUX SECURITY ANNOUNCEMENT 200309-13
- - - ---------------------------------------------------------------------

VERSIONS AFFECTED : <sendmail-8.2.10

- - - ---------------------------------------------------------------------

quote from release notes:

"Fix a buffer overflow in address parsing.  Problem detected by 
Michal Zalewski, patch from Todd C. Miller of Courtesan Consulting.

Fix a potential buffer overflow in ruleset parsing.  This problem
is not exploitable in the default sendmail configuration;
only if non-standard rulesets recipient (2), final (4), or
mailer-specific envelope recipients rulesets are used then
a problem may occur.  Problem noted by Timo Sirainen."

SOLUTION

It is recommended that all Gentoo Linux users who are running
net-mail/sendmail upgrade to sendmail-8.2.10 as follows:

emerge sync
emerge sendmail
emerge clean

- - - ---------------------------------------------------------------------
aliz@gentoo.org - GnuPG key is available at http://dev.gentoo.org/~aliz
- - - ---------------------------------------------------------------------
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.3 (GNU/Linux)

iD8DBQE/aMmXfT7nyhUpoZMRAoyYAJwOr62OQN3G+SXYMC5QXPuU2EjYbACcCfVL
rSrMrf+lRPq9Nqh+pa18i8A=
=c+4s
-----END PGP SIGNATURE-----

 
 


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC