SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Sendmail Vendors:   Sendmail Consortium
(OpenBSD Issues Fix) Sendmail Excessive Recursion in Processing Malformed MIME Messages Lets Remote Users Deny Service
SecurityTracker Alert ID:  1016318
SecurityTracker URL:  http://securitytracker.com/id/1016318
CVE Reference:   CVE-2006-1173   (Links to External Site)
Date:  Jun 16 2006
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 8.13.7
Description:   A vulnerability was reported in Sendmail. A remote user can cause denial of service conditions.

A remote user can send a specially crafted message containing malformed, deeply nested MIME content to cause excessive recursion, leading to stack exhaustion when the system attempts to deliver the message from the queue. Only mail delivered from the queue is affected. The system may fail to reattempt delivery of messages in the queue. Incoming mail is still accepted and delivered.

Also, if the system is configured to write uniquely named core dump files per process, the disk space may become filled with core dumps.

The vendor credits Frank Sheiness with reporting this vulnerability.

Impact:   A remote user may be able to stop the delivery of queued messages.
Solution:   OpenBSD has issued the following patches:

ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.9/common/003_sendmail2.patch
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.8/common/008_sendmail2.patch

Vendor URL:  www.sendmail.org/releases/8.13.7.html (Links to External Site)
Cause:   State error
Underlying OS:  UNIX (OpenBSD)
Underlying OS Comments:  3.8, 3.9

Message History:   This archive entry is a follow-up to the message listed below.
Jun 14 2006 Sendmail Excessive Recursion in Processing Malformed MIME Messages Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC