- --------------------------------------------------------------------------Debian Security Advisory DSA 1164-1                    security@debian.org
http://www.debian.org/security/                             Noah Meyerhans
August 31st, 2006                       http://www.debian.org/security/faq
- --------------------------------------------------------------------------Package        : sendmail
Vulnerability  : programming error
Problem-Type   : remote
Debian-specific: no
CVE ID         : CVE-2006-4434
BugTraq ID     : 19714
Debian Bug     : 385054

A programming error has been discovered in sendmail, an alternative
mail transport agent for Debian, that could allow a remote attacker to
crash the sendmail process by sending a specially crafted email
message.

Please note that in order to install this update you also need
libsasl2 library from proposed updates as outlined in DSA 1155-2.

For the stable distribution (sarge) this problem has been fixed in
version 8.13.3-3sarge3

For the unstable distribution (sid) this problem has been fixed in
version 8.13.8-1

We recommend that you upgrade your sendmail package.


Upgrade Instructions
- --------------------wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given at the end of this advisory:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.


Debian GNU/Linux 3.1 alias sarge
- --------------------------------  Source archives:

          Size/MD5 checksum:      911 89bbdc6b7a1d33146d978408ac7feee2
          Size/MD5 checksum:   385075 a1408b377f382dacfc7d87ef880af60b
          Size/MD5 checksum:  1968047 d80dc659df96c63d227ed80c0c71b708

  Architecture independent components:

          Size/MD5 checksum:   340668 0fd9a5ace798e807cbc60b7a31919a28
          Size/MD5 checksum:   279382 1e8db425833f332fa8a525dc107e4614
          Size/MD5 checksum:   692570 b07b9cfd99ee3bfe38feb62ec408d494
          Size/MD5 checksum:   192242 ce9a17d66058281af9d69563e11c910c

  Alpha architecture:

          Size/MD5 checksum:   319082 223ecb915309c2f467fee4dc70dbb29a
          Size/MD5 checksum:   215652 ed63343a42038fdbf292d20e582a9fa3
          Size/MD5 checksum:   228890 8d087fceb3d923f4892d550419fe6f88
          Size/MD5 checksum:   953980 f50d2db2a52e150ec7466750a5e44bc5
          Size/MD5 checksum:   198182 af2d885e481c00326b2353a071df40b9

  AMD64 architecture:

          Size/MD5 checksum:   296634 6bd8032a3c89d24f918c544ec87794cc
          Size/MD5 checksum:   213268 41723080176c78d5f2cf1d5764bba131
          Size/MD5 checksum:   225344 27729b95e621ad6fc194e45c845268c7
          Size/MD5 checksum:   851254 4928097e8c69f01e33d29bd0e371e796
          Size/MD5 checksum:   197736 f5e2dde229ccd6457323c6d7dc746420

  ARM architecture:

          Size/MD5 checksum:   291974 abf756019dd7a2f75b3bc5c6fc858ec0
          Size/MD5 checksum:   211618 bc7b0597b85aeedbd891d1782aea9b0f
          Size/MD5 checksum:   223712 904f2d271dd078850291aa63fed9c077
          Size/MD5 checksum:   829384 96686dd8dcd45be34f2f34f64222f558
          Size/MD5 checksum:   197276 714fd487ba82221cf9261d61c833b20b

  HP Precision architecture:

          Size/MD5 checksum:   301562 6991aa63aa29e3753ea4eda0e74004f6
          Size/MD5 checksum:   215700 cc89d2e0be9162c065467bfb3e5fc5e8
          Size/MD5 checksum:   229448 4ed50645b31de5c3b7747286a1de8ce9
          Size/MD5 checksum:   919852 50e486568dec792055f001172a38d45c
          Size/MD5 checksum:   198168 3802ef117e38733a991721a6e70167a5

  Intel IA-32 architecture:

          Size/MD5 checksum:   287344 23bd405e21c9de501d7e8957ed5b2eae
          Size/MD5 checksum:   211730 2edbe3c6b12742657071e43618211f97
          Size/MD5 checksum:   222522 907a59032ba64011292bbff04e001409
          Size/MD5 checksum:   812646 8dc795ba8ffc47659d95f727c20c4711
          Size/MD5 checksum:   197428 64eab16e247f5ed9af468e2e804a3e53

  Intel IA-64 architecture:

          Size/MD5 checksum:   330754 6f32b98862faace5980f5a809acbdbf7
          Size/MD5 checksum:   220496 f94e024b1d70452c6e31aae8032c80cf
          Size/MD5 checksum:   239734 77b337f036edd22ffee5bcd26ccc53fd
          Size/MD5 checksum:  1162690 39b68375190c0ed7b7f6ec42cc08feb3
          Size/MD5 checksum:   199028 ac0d46969e6f38ba6ea9695ba012fb83

  Motorola 680x0 architecture:

          Size/MD5 checksum:   272860 8b2a2e0cb36979ec484ae21ee7b952f3
          Size/MD5 checksum:   210922 2c80dc1697abb910900d9dea976e0111
          Size/MD5 checksum:   218922 63292f132b4c14935d66eafbd10c8b59
          Size/MD5 checksum:   728606 396de790dcc5135069bbb4374c27ae41
          Size/MD5 checksum:   197236 9241946b199056978336c255c072d348

  Big endian MIPS architecture:

          Size/MD5 checksum:   293200 0e8866145d40f303d076b2529038bad3
          Size/MD5 checksum:   212100 55ba2084a7d0b43994a8c983c11e08d8
          Size/MD5 checksum:   227434 c559e338459cefee76c1a2ab3efc40e6
          Size/MD5 checksum:   883544 29e2b015a7e86d0ef26a779b73e23c11
          Size/MD5 checksum:   198194 3fd107d5b11c0b83d6894b360f5d2f2e

  Little endian MIPS architecture:

          Size/MD5 checksum:   293842 787fb9e91e842e7f712396a8d585da95
          Size/MD5 checksum:   212282 4e19166d5eb89e0d30dd0a632f0efba3
          Size/MD5 checksum:   227590 aa971533751193be6b37b1616f321cad
          Size/MD5 checksum:   886922 98ee38b69275c0dd03425316c8c288bc
          Size/MD5 checksum:   198222 a04e73c2282781f36cd8323297f5d5b0

  PowerPC architecture:

          Size/MD5 checksum:   294438 1a5d40faaf7c440b9a37c808df4bd252
          Size/MD5 checksum:   214504 ea3bd8e59d8d2a9987fde2a5bbc1073b
          Size/MD5 checksum:   226918 25f3b5b6310e41eb0f151dfddc556caa
          Size/MD5 checksum:   865018 88a5ffaa0bbc0c856c0402f9bc4a9479
          Size/MD5 checksum:   197786 0959fe3b6f7e445abed6b5f2c9992684

  IBM S/390 architecture:

          Size/MD5 checksum:   295212 e6095777105434012463b4e3009cb332
          Size/MD5 checksum:   213348 0bda9d806c5006edea39afecae1ad329
          Size/MD5 checksum:   228722 90e47d3b0839b7ad337b29a3b212ee09
          Size/MD5 checksum:   875318 9c6a10583814ce3ba0b0fcde1aab1893
          Size/MD5 checksum:   197708 f03a2ce3e1d9644eef33a805e42f3705

  Sun Sparc architecture:

          Size/MD5 checksum:   285462 76b0de0933652b1010ec2ac044b8081b
          Size/MD5 checksum:   211670 8fd780da99800d30ab26755790b37eb6
          Size/MD5 checksum:   222924 5cc657807e798fb6dfc6910c4d3c13ae
          Size/MD5 checksum:   819536 232fadedc528ab4962c543796a277055
          Size/MD5 checksum:   197440 a6775780418e0729d016ae80774b336d


  These files will probably be moved into the stable distribution on
  its next update.

- ---------------------------------------------------------------------------------For apt-get: deb http://security.debian.org/ stable/updates main
For dpkg-ftp:  dists/stable/updates/main
Mailing list: debian-security-announce@lists.debian.org

Debian: New sendmail packages fix denial of service

August 31, 2006
A programming error has been discovered in sendmail, an alternative mail transport agent for Debian, that could allow a remote attacker to crash the sendmail process by sending a s...

Summary

Severity

Related News