MGASA-2024-0270 - Updated sendmail packages fix security vulnerability

Publication date: 16 Jul 2024
URL: https://advisories.mageia.org/MGASA-2024-0270.html
Type: security
Affected Mageia releases: 9
CVE: CVE-2023-51765

sendmail through 8.17.2 allows SMTP smuggling in certain configurations.
Remote attackers can use a published exploitation technique to inject
e-mail messages with a spoofed MAIL FROM address, allowing bypass of an
SPF protection mechanism. This occurs because sendmail supports
. but some other popular e-mail servers do not. This is
resolved in 8.18 and later versions with 'o' in srv_features.
(CVE-2023-51765)

References:
- https://bugs.mageia.org/show_bug.cgi?id=32700
- https://www.openwall.com/lists/oss-security/2023/12/21/6
- https://www.openwall.com/lists/oss-security/2023/12/26/5
- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51765

SRPMS:
- 9/core/sendmail-8.17.1-4.1.mga9

Mageia 2024-0270: sendmail Security Advisory Updates

sendmail through 8.17.2 allows SMTP smuggling in certain configurations

Summary

sendmail through 8.17.2 allows SMTP smuggling in certain configurations. Remote attackers can use a published exploitation technique to inject e-mail messages with a spoofed MAIL FROM address, allowing bypass of an SPF protection mechanism. This occurs because sendmail supports . but some other popular e-mail servers do not. This is resolved in 8.18 and later versions with 'o' in srv_features. (CVE-2023-51765)

References

- https://bugs.mageia.org/show_bug.cgi?id=32700

- https://www.openwall.com/lists/oss-security/2023/12/21/6

- https://www.openwall.com/lists/oss-security/2023/12/26/5

- https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-51765

Resolution

MGASA-2024-0270 - Updated sendmail packages fix security vulnerability

SRPMS

- 9/core/sendmail-8.17.1-4.1.mga9

Severity
Publication date: 16 Jul 2024
URL: https://advisories.mageia.org/MGASA-2024-0270.html
Type: security
CVE: CVE-2023-51765

Related News