SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (E-mail Server)  >   Sendmail Vendors:   Sendmail Consortium
(HP Issues Fix for Tru64) Sendmail Excessive Recursion in Processing Malformed MIME Messages Lets Remote Users Deny Service
SecurityTracker Alert ID:  1016319
SecurityTracker URL:  http://securitytracker.com/id/1016319
CVE Reference:   CVE-2006-1173   (Links to External Site)
Date:  Jun 16 2006
Impact:   Denial of service via network
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): prior to 8.13.7
Description:   A vulnerability was reported in Sendmail. A remote user can cause denial of service conditions.

A remote user can send a specially crafted message containing malformed, deeply nested MIME content to cause excessive recursion, leading to stack exhaustion when the system attempts to deliver the message from the queue. Only mail delivered from the queue is affected. The system may fail to reattempt delivery of messages in the queue. Incoming mail is still accepted and delivered.

Also, if the system is configured to write uniquely named core dump files per process, the disk space may become filled with core dumps.

The vendor credits Frank Sheiness with reporting this vulnerability.

Impact:   A remote user may be able to stop the delivery of queued messages.
Solution:   HP has issued the following Early Release Patch kits (ERPs).

HP Tru64 UNIX Version 5.1B-3 ERP Kit

Location: http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1000619-V51BB26-ES-20060515

Name:T64KIT1000619-V51BB26-ES-20060515

MD5 Checksum: d8bb00d342b21de6fba54baed8617282

HP Tru64 UNIX Version 5.1B-2/PK4 ERP Kit

Location: http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1000617-V51BB25-ES-20060515

Name: T64KIT1000617-V51BB25-ES-20060515

MD5 Checksum: 1d8a0dc34628b5898c99b6dab2714320

HP Tru64 UNIX Version 5.1A PK6 ERP Kit

Location: http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1000618-V51AB24-ES-20060515

Name: T64KIT1000618-V51AB24-ES-20060515

MD5 Checksum: b9a2ef1d0c1745ce0fa265b2d2fd8c32

HP Tru64 UNIX Version 4.0G PK4 ERP Kit

Location: http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=T64KIT1000635-V40GB22-ES-20060519

Name: T64KIT1000635-V40GB22-ES-20060519

MD5 Checksum: 2c74941543d969c92adef38a44b5c764

HP Tru64 UNIX Version 4.0F PK8 ERP Kit

Location: http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=DUXKIT1000636-V40FB22-ES-20060519

Name: DUXKIT1000636-V40FB22-ES-20060519

MD5 Checksum: 9735ad5cc5c705e8bbbbefb01feb4128

HP Internet Express for Tru64 UNIX V6.3 ERP Kit

Location: http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=T64V51AB-IX-631-SENDMAIL-SSRT-061135

Name: T64V51AB-IX-631-SENDMAIL-SSRT-061135

MD5 Checksum: ee9e7d5b0cc01e0424edc05021670820

HP Internet Express for Tru64 UNIX V6.4 ERP Kit

Location: http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=T64V51AB-IX-641-SENDMAIL-SSRT-061135

Name: T64V51AB-IX-641-SENDMAIL-SSRT-061135

MD5 Checksum: 5b1a544575a62831c173fc489b8eaeea

HP Internet Explorer for Tru64 UNIX V6.5 ERP Kit

Location: http://www2.itrc.hp.com/service/patch/patchDetail.do?patchid=T64V51AB-IX-651-SENDMAIL-SSRT-061135

Name: T64V51AB-IX-651-SENDMAIL-SSRT-061135

MD5 Checksum: 0b6268159a9957c56ff2f35cea2057d8

The HP advisory is available at:

http://www2.itrc.hp.com/service/cki/docDisplay.do?docId=c00692635

Vendor URL:  www.sendmail.org/releases/8.13.7.html (Links to External Site)
Cause:   State error
Underlying OS:  UNIX (Tru64)
Underlying OS Comments:  4.0F PK8, 4.0G PK4, 5.1A PK6, 5.1B-2/PK4, 5.1B-3

Message History:   This archive entry is a follow-up to the message listed below.
Jun 14 2006 Sendmail Excessive Recursion in Processing Malformed MIME Messages Lets Remote Users Deny Service



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC