Linux-Bulgaria.ORG
навигация

 

начало

пощенски списък

архив на групата

семинари ...

документи

как да ...

 

 

Предишно писмо Следващо писмо Предишно по тема Следващо по тема По Дата По тема (thread)

Re: Re[2]: lug-bg: sendmail <8.12.8 vulnerable


  • Subject: Re: Re[2]: lug-bg: sendmail <8.12.8 vulnerable
  • From: vlk@email.domain.hidden (Vesselin Kolev)
  • Date: Tue, 4 Mar 2003 11:43:54 +0200


-----BEGIN PGP SIGNED MESSAGE-----
Hash: SHA1

On Tuesday 04 Mar 2003 12:17, Todor Lazarov wrote:
<em class="quotelev1">>
<em class="quotelev1">> Ñåðèîçåí ëè å ïðîáëåìà ???

Eto opisanieto na problema, pri tova e napisano mnogo po-razbrano
ot kolkoto CERT sa go napravili. Niakoi hora v CERT (osobeno redaktorite)
sa tzare na neiasnata misal:)

<p>- -->

Security Advisory - RHSA-2003:073-06
- ------------------------------------------------------------------------------
Summary:
Updated sendmail packages fix critical security issues

Updated Sendmail packages are available to fix a vulnerability that
may allow remote attackers to gain root privileges by sending a
carefully crafted message.

These packages also fix a security bug if sendmail is configured to use smrsh.

Description:
Sendmail is a widely used Mail Transport Agent (MTA) which is included
in all Red Hat Linux distributions.

During a code audit of Sendmail by ISS, a critical vulnerability was
uncovered that affects unpatched versions of Sendmail prior to version
8.12.8.  A remote attacker can send a carefully crafted email message
which, when processed by sendmail, causes arbitrary code to be
executed as root.

We are advised that a proof-of-concept exploit is known to exist, but
is not believed to be in the wild.

Since this is a message-based vulnerability, MTAs other than Sendmail
may pass on the carefully crafted message.  This means that unpatched
versions of Sendmail inside a network could still be at risk even if
they do not accept external connections directly.

In addition, the restricted shell (SMRSH) in Sendmail  allows attackers to
bypass the intended restrictions of smrsh by inserting additional commands
after "||" sequences or "/" characters, which are not properly filtered or
verified.  A sucessful attack would allow an attacker who has a local
account on a system which has explicitly enabled smrsh to execute arbitrary
binaries as themselves by utilizing their .forward file. 

All users are advised to update to these erratum packages.  For Red Hat
Linux 8.0 we have included Sendmail version 8.12.8 which is not vulnerable
to these issues.  For all other distributions we have included a backported
patch which corrects these vulnerabilities.

Red Hat would like to thank Eric Allman for his assistance with this
vulnerability.

References:
http://www.cert.org/advisories/CA-2003-07.html
http://marc.theaimsgroup.com/?l=bugtraq&m=103350914307274
- ------------------------------------------------------------------------------

- -------------
Taking Action
- -------------
You may address the issues outlined in this advisory in two ways:

     - select your server name by clicking on its name from the list
       available at the following location, and then schedule an
       errata update for it:
           https://rhn.redhat.com/network/systemlist/system_list.pxt

     - run the Update Agent on each affected server.

<p>- ---------------------------------
Changing Notification Preferences
- ---------------------------------
To enable/disable your Errata Alert preferences globally please log in to RHN
and navigate from "Your RHN" / "Your Account" to the "Preferences" tab.

        URL: https://rhn.redhat.com/network/my_account/my_prefs.pxt

You can also enable/disable notification on a per system basis by selecting an
individual system from the "Systems List". From the individual system view
click the "Details" tab.

<p>- ----------------
Affected Systems
- ----------------
According to our records, this errata may apply to one or more of the 
systems that you've profiled with Red Hat Network.  To see precisely which 
systems are affected, please go to:
    https://rhn.redhat.com/network/errata/systems_affected.pxt?eid=1504

<p><p>The Red Hat Network Team

This message is being sent by Red Hat Network Alert to:
    RHN user login:        vlk_at_lcpe
    Email address on file: <vlk_at_lcpe.uni-sofia.bg>

If you lost your RHN password, you can use the information above to
retrieve it by email from the following address:
    https://rhn.redhat.com/forgot_password.pxt

To cancel these notices, go to:
    https://rhn.redhat.com/oo.pxt?uid=1793678&oid=2352664

- -->

   Pozdravi
     Vesselin Kolev
-----BEGIN PGP SIGNATURE-----
Version: GnuPG v1.2.1 (GNU/Linux)

iD8DBQE+ZHVh+48lZPXaa+MRAoOEAKDu02pwcCSH8oHuAA/sy84ai3JaIQCfZf2a
s5lGGjxbjHlNvCrgEmAXrJk=
=Yn1d
-----END PGP SIGNATURE-----

============================================================================
A mail-list of Linux Users Group - Bulgaria (bulgarian linuxers).
http://www.linux-bulgaria.org - Hosted by Internet Group Ltd. - Stara Zagora
To unsubscribe: http://www.linux-bulgaria.org/public/mail_list.html
============================================================================



 

наши приятели

 

линукс за българи
http://linux-bg.org

FSA-BG
http://fsa-bg.org

OpenFest
http://openfest.org

FreeBSD BG
http://bg-freebsd.org

KDE-BG
http://kde.fsa-bg.org/

Gnome-BG
http://gnome.cult.bg/

проект OpenFMI
http://openfmi.net

NetField Forum
http://netField.ludost.net/forum/

 

 

Linux-Bulgaria.ORG

Mailing list messages are © Copyright their authors.