Debian: sendmail buffer overlow vulnerabilities

    Date18 Sep 2003
    Posted ByLinuxSecurity Advisories
    There are multiple buffer overflow vulnerabilities in the sendmail package.
    - --------------------------------------------------------------------------
    Debian Security Advisory DSA 384-1                     This email address is being protected from spambots. You need JavaScript enabled to view it.                             Matt Zimmerman
    September 17th, 2003           
    - --------------------------------------------------------------------------
    Package        : sendmail
    Vulnerability  : buffer overflows
    Problem-Type   : remote
    Debian-specific: no
    CVE Ids        : CAN-2003-0681 CAN-2003-0694
    Two vulnerabilities were reported in sendmail.
     - CAN-2003-0681
       A "potential buffer overflow in ruleset parsing" for Sendmail
       8.12.9, when using the nonstandard rulesets (1) recipient (2),
       final, or (3) mailer-specific envelope recipients, has unknown
     - CAN-2003-0694
      The prescan function in Sendmail 8.12.9 allows remote attackers to
      execute arbitrary code via buffer overflow attacks, as demonstrated
      using the parseaddr function in parseaddr.c.
    For the stable distribution (woody) these problems have been fixed in
    sendmail version 8.12.3-6.6 and sendmail-wide version
    For the unstable distribution (sid) these problems have been fixed in
    sendmail version 8.12.10-1.
    We recommend that you update your sendmail package.
    Upgrade Instructions
    - --------------------
    wget url
            will fetch the file for you
    dpkg -i file.deb
            will install the referenced file.
    If you are using the apt-get package manager, use the line for
    sources.list as given below:
    apt-get update
            will update the internal database
    apt-get upgrade
            will install corrected packages
    You may use an automated update by adding the resources from the
    footer to the proper configuration.
    Debian GNU/Linux 3.0 alias woody
    - --------------------------------
      Source archives:
          Size/MD5 checksum:      751 a7d0da0bedbe35592233cb9ce710f551
          Size/MD5 checksum:   255026 5a86a93275a55af8c92677469c4a8cd3
          Size/MD5 checksum:  1840401 b198b346b10b3b5afc8cb4e12c07ff4d
          Size/MD5 checksum:      738 cc23a68bcf23332d560086c3c55cd16a
          Size/MD5 checksum:   327218 7f2fc2d0efe7935713b2d77dec66359c
          Size/MD5 checksum:  1870451 4c7036e8042bae10a90da4a84a717963
      Architecture independent components:
          Size/MD5 checksum:   747778 9c4362147654d4f28d8346fa4ad84ed0
      Alpha architecture:
          Size/MD5 checksum:   267842 4f53274558b9e29ca341721a68fb4adc
          Size/MD5 checksum:  1109340 78cb6eb6b340e5dc52982889532a844a
          Size/MD5 checksum:   440712 b22b97caba3652ef2a7d9f35633e3040
      ARM architecture:
          Size/MD5 checksum:   247568 ac8f0778eb56f7c0a852fdc54ef071b1
          Size/MD5 checksum:   979454 6b9898686e6361abe657c5fd75d962c5
          Size/MD5 checksum:   369568 3baf5caa46b2c9d0b67c6d60f47d8030
      Intel IA-32 architecture:
          Size/MD5 checksum:   237374 0662e6e9bb58db37a1d8f511e4ba2fce
          Size/MD5 checksum:   917848 3717265bb7ed3f5bd81fb9a712826cec
          Size/MD5 checksum:   328914 23af5c312cef6a53f000f4663980b11d
      Intel IA-64 architecture:
          Size/MD5 checksum:   282028 a35b9ca4cfc7a1c1ec6bdb1f2e00d8bb
          Size/MD5 checksum:  1332734 9f4ae78c3aa4644366e7e3f4bb787096
          Size/MD5 checksum:   575024 9e4283bf8427361959efc71fa10b47db
      HP Precision architecture:
          Size/MD5 checksum:   261692 a91642fb4a90687c7d318342cac40b81
          Size/MD5 checksum:  1081070 f8359f91edc1a1587de9ef3fee05e48a
          Size/MD5 checksum:   413758 f7ebfefbe7bc3a212a0233531969d6ce
      Motorola 680x0 architecture:
          Size/MD5 checksum:   231156 5a6f6c5597d65c625a8f93bca3ba91c7
          Size/MD5 checksum:   865868 3f8e05c30f67a10b3148868b884b181a
          Size/MD5 checksum:   300824 fcfe51748953a3cbec6b67ec6b59c815
      Big endian MIPS architecture:
          Size/MD5 checksum:   255192 f6e277fc5dd3aad2471224cd5a93d8b2
          Size/MD5 checksum:  1022140 9ffa270d18fcff47eb50a379abf83423
          Size/MD5 checksum:   378446 3eb569322bf2ca44efad2e619ac60e09
      Little endian MIPS architecture:
          Size/MD5 checksum:   254886 1671ae782111b31689db3cdcc8a685ca
          Size/MD5 checksum:  1022564 2c6d07a51a6799b3adf0465708ea965a
          Size/MD5 checksum:   380428 af4eb3885b34141ac8ca280d9588c236
      PowerPC architecture:
          Size/MD5 checksum:   257296 6327996cfa6ba83133ca891e9ee7e06b
          Size/MD5 checksum:   978630 a328cc8608dfe496bacb51984a813eff
          Size/MD5 checksum:   363018 a7310a71887232474be479fdc0dc8846
      IBM S/390 architecture:
          Size/MD5 checksum:   242622 86d18643513d01467640277260d5faf4
          Size/MD5 checksum:   966352 db7b4c5516759dde0c244f87394e206a
          Size/MD5 checksum:   354934 7d9e5afceef87330409cc68a284e0b99
      Sun Sparc architecture:
          Size/MD5 checksum:   245326 d2c2c75a72bb25db831cf200aaa84ae2
          Size/MD5 checksum:   982550 7e755b31bb2b0db5aa82ca5f516ac46d
          Size/MD5 checksum:   356148 c330e1560c9b37e25dd73947fe6fbc22
      These files will probably be moved into the stable distribution on
      its next revision.
    - ---------------------------------------------------------------------------------
    For apt-get: deb stable/updates main
    For dpkg-ftp: dists/stable/updates/main
    Mailing list: This email address is being protected from spambots. You need JavaScript enabled to view it.
    Package info: `apt-cache show ' and
    You are not authorised to post comments.

    Comments powered by CComment

    LinuxSecurity Poll

    What do you think of the LinuxSecurity Privacy news articles?

    No answer selected. Please try again.
    Please select either existing option or enter your own, however not both.
    Please select minimum 0 answer(s) and maximum 3 answer(s).
    [{"id":"90","title":"Love them!","votes":"5","type":"x","order":"1","pct":100,"resources":[]},{"id":"91","title":"I'm indifferent","votes":"0","type":"x","order":"2","pct":0,"resources":[]},{"id":"92","title":"Not interested in this topic","votes":"0","type":"x","order":"3","pct":0,"resources":[]}]["#ff5b00","#4ac0f2","#b80028","#eef66c","#60bb22","#b96a9a","#62c2cc"]["rgba(255,91,0,0.7)","rgba(74,192,242,0.7)","rgba(184,0,40,0.7)","rgba(238,246,108,0.7)","rgba(96,187,34,0.7)","rgba(185,106,154,0.7)","rgba(98,194,204,0.7)"]350

    We use cookies to provide and improve our services. By using our site, you consent to our Cookie Policy.