SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Sendmail Vendors:   Sendmail Consortium
(Sun Describes Workaround) Sendmail Excessive Recursion in Processing Malformed MIME Messages Lets Remote Users Deny Service
SecurityTracker Alert ID:  1016299
SecurityTracker URL:  http://securitytracker.com/id/1016299
CVE Reference:   CVE-2006-1173   (Links to External Site)
Date:  Jun 14 2006
Impact:   Denial of service via network
Vendor Confirmed:  Yes  
Version(s): prior to 8.13.7
Description:   A vulnerability was reported in Sendmail. A remote user can cause denial of service conditions.

A remote user can send a specially crafted message containing malformed, deeply nested MIME content to cause excessive recursion, leading to stack exhaustion when the system attempts to deliver the message from the queue. Only mail delivered from the queue is affected. The system may fail to reattempt delivery of messages in the queue. Incoming mail is still accepted and delivered.

Also, if the system is configured to write uniquely named core dump files per process, the disk space may become filled with core dumps.

The vendor credits Frank Sheiness with reporting this vulnerability.

Impact:   A remote user may be able to stop the delivery of queued messages.
Solution:   Sun is working on a fix. Sun has described a workaround in their advisory, available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-26-102460-1

Vendor URL:  www.sendmail.org/releases/8.13.7.html (Links to External Site)
Cause:   State error
Underlying OS:  UNIX (Solaris - SunOS)
Underlying OS Comments:  8, 9, 10

Message History:   This archive entry is a follow-up to the message listed below.
Jun 14 2006 Sendmail Excessive Recursion in Processing Malformed MIME Messages Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC