Re: Re[2]: lug-bg: sendmail <8.12.8 vulnerable
- Subject: Re: Re[2]: lug-bg: sendmail <8.12.8 vulnerable
- From: vlk@email.domain.hidden (Vesselin Kolev)
- Date: Tue, 4 Mar 2003 11:43:54 +0200
-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1
On Tuesday 04 Mar 2003 12:17, Todor Lazarov wrote:
<em class="quotelev1">>
<em class="quotelev1">> Ñåðèîçåí ëè å ïðîáëåìà ???
Eto opisanieto na problema, pri tova e napisano mnogo po-razbrano
ot kolkoto CERT sa go napravili. Niakoi hora v CERT (osobeno redaktorite)
sa tzare na neiasnata misal:)
<p>- -->
Security Advisory - RHSA-2003:073-06
- ------------------------------------------------------------------------------
Summary:
Updated sendmail packages fix critical security issues
Updated Sendmail packages are available to fix a vulnerability that
may allow remote attackers to gain root privileges by sending a
carefully crafted message.
These packages also fix a security bug if sendmail is configured to use smrsh.
Description:
Sendmail is a widely used Mail Transport Agent (MTA) which is included
in all Red Hat Linux distributions.
During a code audit of Sendmail by ISS, a critical vulnerability was
uncovered that affects unpatched versions of Sendmail prior to version
8.12.8. A remote attacker can send a carefully crafted email message
which, when processed by sendmail, causes arbitrary code to be
executed as root.
We are advised that a proof-of-concept exploit is known to exist, but
is not believed to be in the wild.
Since this is a message-based vulnerability, MTAs other than Sendmail
may pass on the carefully crafted message. This means that unpatched
versions of Sendmail inside a network could still be at risk even if
they do not accept external connections directly.
In addition, the restricted shell (SMRSH) in Sendmail allows attackers to
bypass the intended restrictions of smrsh by inserting additional commands
after "||" sequences or "/" characters, which are not properly filtered or
verified. A sucessful attack would allow an attacker who has a local
account on a system which has explicitly enabled smrsh to execute arbitrary
binaries as themselves by utilizing their .forward file.
All users are advised to update to these erratum packages. For Red Hat
Linux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable
to these issues. For all other distributions we have included a backported
patch which corrects these vulnerabilities.
Red Hat would like to thank Eric Allman for his assistance with this
vulnerability.
References:
http://www.cert.org/advisories/CA-2003-07.html
http://marc.theaimsgroup.com/?l=bugtraq&m=103350914307274
- ------------------------------------------------------------------------------
- -------------
Taking Action
- -------------
You may address the issues outlined in this advisory in two ways:
- select your server name by clicking on its name from the list
available at the following location, and then schedule an
errata update for it:
https://rhn.redhat.com/network/systemlist/system_list.pxt
- run the Update Agent on each affected server.
<p>- ---------------------------------
Changing Notification Preferences
- ---------------------------------
To enable/disable your Errata Alert preferences globally please log in to RHN
and navigate from "Your RHN" / "Your Account" to the "Preferences" tab.
URL: https://rhn.redhat.com/network/my_account/my_prefs.pxt
You can also enable/disable notification on a per system basis by selecting an
individual system from the "Systems List". From the individual system view
click the "Details" tab.
<p>- ----------------
Affected Systems
- ----------------
According to our records, this errata may apply to one or more of the
systems that you've profiled with Red Hat Network. To see precisely which
systems are affected, please go to:
https://rhn.redhat.com/network/errata/systems_affected.pxt?eid=1504
<p><p>The Red Hat Network Team
This message is being sent by Red Hat Network Alert to:
RHN user login: vlk_at_lcpe
Email address on file: <vlk_at_lcpe.uni-sofia.bg>
If you lost your RHN password, you can use the information above to
retrieve it by email from the following address:
https://rhn.redhat.com/forgot_password.pxt
To cancel these notices, go to:
https://rhn.redhat.com/oo.pxt?uid=1793678&oid=2352664
- -->
Pozdravi
Vesselin Kolev
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)
iD8DBQE+ZHVh+48lZPXaa+MRAoOEAKDu02pwcCSH8oHuAA/sy84ai3JaIQCfZf2a
s5lGGjxbjHlNvCrgEmAXrJk=
=Yn1d
-----END PGP SIGNATURE-----
============================================================================
A mail-list of Linux Users Group - Bulgaria (bulgarian linuxers).
http://www.linux-bulgaria.org - Hosted by Internet Group Ltd. - Stara Zagora
To unsubscribe: http://www.linux-bulgaria.org/public/mail_list.html
============================================================================
|