Desbordamiento de búfer en Sendmail
|
Vulnerability classification
|
Property |
Value |
Confidence level |
Oficial |
Impact |
Compromiso Root |
Dificulty |
Avanzado |
Required attacker level |
Acceso remoto sin cuenta a un servicio estandar |
System information
|
Property |
Value |
Affected manufacturer |
GNU/Linux |
Affected software |
Sendmail Pro
Sendmail Switch 2.1 < 2.1.6
Sendmail Switch 2.2 < 2.2.6
Sendmail Switch 3.0 < 3.0.4
Sendmail NT 2.X < 2.6.3
Sendmail NT 3.0 < 3.0.4
Sendmail GNU/Linux < 8.12.9 |
Description
|
Se ha detectado una vulnerabilidad en Sendmail en la que un atacante remoto puede provocar una denegación de servicio e incluso puede ejecutar código arbitrario con privilegios de root.
Esta vulnerabilidad viene dada por un error en el control de la longitud de las direcciones de correo. Un potencial atacante puede explotar dicha vulnerabilidad mediante el envío de un mensaje con un formato especial provocando un desbordamiento de pila. |
Solution
|
Aplique los mecanismos de actualización propios de su distribución, o bien obtenga las fuentes del software y compílelo usted mismo.
Actualización de software
Sendmail
Parches para las versiones de Sendmail (Open Source) 8.9, 8.10, 8.11 y 8.12
ftp://ftp.sendmail.org/pub/sendmail/prescan.tar.gz.uu
Sendmail v. 8.12.9
ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.12.9.tar.gz
Aplique el parche de Sendmail (versión comercial) concerniente al desbordamiento de búfer en Sendmail
Actualizaciones para Sendmail(versión comercial)
http://www.sendmail.com/support/download/
FreeBSD
Parche para FreeBSD 4.6, 4.7 y 5.0
ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:07/sendmail.patch
Linux Slackware
Parche para la última versión de Slackware
ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/sendmail-8.12.8-i386-1.tgz
Parche para Linux Slackware 8.1
ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/sendmail-8.12.8-i386-1.tgz
Red Hat Linux 6.2
[arch]/sendmail-8.11.6-1.62.3.i386.rpm
[arch]/sendmail-cf-8.11.6-1.62.3.i386.rpm
[arch]/sendmail-doc-8.11.6-1.62.3.i386.rpm
Red Hat Linux 7.0
[arch]/sendmail-8.11.6-25.70.i386.rpm
[arch]/sendmail-cf-8.11.6-25.70.i386.rpm
[arch]/sendmail-devel-8.11.6-25.70.i386.rpm
[arch]/sendmail-doc-8.11.6-25.70.i386.rpm
Red Hat Linux 7.1
[arch]/sendmail-8.11.6-25.71.i386.rpm
[arch]/sendmail-cf-8.11.6-25.71.i386.rpm
[arch]/sendmail-devel-8.11.6-25.71.i386.rpm
[arch]/sendmail-doc-8.11.6-25.71.i386.rpm
Red Hat Linux 7.2
[arch]/sendmail-8.11.6-25.72.i386.rpm
[arch]/sendmail-cf-8.11.6-25.72.i386.rpm
[arch]/sendmail-devel-8.11.6-25.72.i386.rpm
[arch]/sendmail-doc-8.11.6-25.72.i386.rpm
Red Hat Linux 7.3
[arch]/sendmail-8.11.6-25.73.i386.rpm
[arch] /sendmail-cf-8.11.6-25.73.i386.rpm
[arch]/sendmail-devel-8.11.6-25.73.i386.rpm
[arch]/sendmail-doc-8.11.6-25.73.i386.rpm
Red Hat Linux 8.0
[arch]/sendmail-8.12.8-5.80.i386.rpm
[arch]/sendmail-cf-8.12.8-5.80.i386.rpm
[arch]/sendmail-devel-8.12.8-5.80.i386.rpm
[arch]/sendmail-doc-8.12.8-5.80.i386.rpm
Red Hat Linux 9
[arch]/sendmail-8.12.8-5.90.i386.rpm
[arch]/sendmail-cf-8.12.8-5.90.i386.rpm
[arch]/sendmail-devel-8.12.8-5.90.i386.rpm
[arch]/sendmail-doc-8.12.8-5.90.i386.rpm
SUN
Parche temporal de Sun:
ftp://sunsolve.sun.com/cores/sendmail-01.tar.Z
SuSE-8.1 :
/update/8.1/rpm/i586/sendmail-8.12.6-109.[arch].rpm
/update/8.1/rpm/i586/sendmail-8.12.6-109.[arch].patch.rpm (correctif)
/update/8.1/rpm/src/sendmail-8.12.6-109.src.rpm (source)
SuSE-8.0 :
/update/8.0/n1/sendmail-8.12.3-75.[arch].rpm
/update/8.0/n1/sendmail-8.12.3-75.[arch].patch.rpm (correctif)
/update/8.0/zq1/sendmail-8.12.3-75.src.rpm (source)
SuSE-7.3 :
/update/7.3/n1/sendmail-8.11.6-164.[arch].rpm
/update/7.3/sec2/sendmail-tls-8.11.6-166.[arch].rpm (correctif)
/update/7.3/zq1/sendmail-8.11.6-164.src.rpm (source)
/update/7.3/zq1/sendmail-tls-8.11.6-166.src.rpm
SuSE-7.2 :
/update/7.2/n1/sendmail-8.11.3-108.[arch].rpm
/update/7.2/sec2/sendmail-tls-8.11.3-112.[arch].rpm (correctif)
/update/7.2/zq1/sendmail-8.11.3-108.src.rpm (source)
/update/7.2/zq1/sendmail-tls-8.11.3-112.src.rpm
SuSE-7.1 :
/update/7.1/n1/sendmail-8.11.2-45.[arch].rpm
/update/7.1/sec2/sendmail-tls-8.11.2-47.[arch].rpm
/update/7.1/zq1/sendmail-8.11.2-45.src.rpm
/update/7.1/zq1/sendmail-tls-8.11.2-47.src.rpm
Mandrake Corporate Server 2.1 :
corporate/2.1/RPMS/sendmail-8.12.6-3.3mdk.i586.rpm
corporate/2.1/RPMS/sendmail-cf-8.12.6-3.3mdk.i586.rpm
corporate/2.1/RPMS/sendmail-devel-8.12.6-3.3mdk.i586.rpm
corporate/2.1/RPMS/sendmail-doc-8.12.6-3.3mdk.i586.rpm
corporate/2.1/SRPMS/sendmail-8.12.6-3.3mdk.src.rpm
Mandrake Linux 8.2 :
8.2/RPMS/sendmail-8.12.1-4.3mdk.i586.rpm
8.2/RPMS/sendmail-cf-8.12.1-4.3mdk.i586.rpm
8.2/RPMS/sendmail-devel-8.12.1-4.3mdk.i586.rpm
8.2/RPMS/sendmail-doc-8.12.1-4.3mdk.i586.rpm
8.2/SRPMS/sendmail-8.12.1-4.3mdk.src.rpm
Mandrake Linux 8.2/PPC :
ppc/8.2/RPMS/sendmail-8.12.1-4.3mdk.ppc.rpm
ppc/8.2/RPMS/sendmail-cf-8.12.1-4.3mdk.ppc.rpm
ppc/8.2/RPMS/sendmail-devel-8.12.1-4.3mdk.ppc.rpm
ppc/8.2/RPMS/sendmail-doc-8.12.1-4.3mdk.ppc.rpm
ppc/8.2/SRPMS/sendmail-8.12.1-4.3mdk.src.rpm
Mandrake Linux 9.0 :
9.0/RPMS/sendmail-8.12.6-3.3mdk.i586.rpm
9.0/RPMS/sendmail-cf-8.12.6-3.3mdk.i586.rpm
9.0/RPMS/sendmail-devel-8.12.6-3.3mdk.i586.rpm
9.0/RPMS/sendmail-doc-8.12.6-3.3mdk.i586.rpm
9.0/SRPMS/sendmail-8.12.6-3.3mdk.src.rpm
Mandrake Linux 9.1 :
9.1/RPMS/sendmail-8.12.9-1.1mdk.i586.rpm
9.1/RPMS/sendmail-cf-8.12.9-1.1mdk.i586.rpm
9.1/RPMS/sendmail-devel-8.12.9-1.1mdk.i586.rpm
9.1/RPMS/sendmail-doc-8.12.9-1.1mdk.i586.rpm
9.1/SRPMS/sendmail-8.12.9-1.1mdk.src.rpm
Mandrake Linux 9.1/PPC :
ppc/9.1/RPMS/sendmail-8.12.9-1.1mdk.ppc.rpm
ppc/9.1/RPMS/sendmail-cf-8.12.9-1.1mdk.ppc.rpm
ppc/9.1/RPMS/sendmail-devel-8.12.9-1.1mdk.ppc.rpm
ppc/9.1/RPMS/sendmail-doc-8.12.9-1.1mdk.ppc.rpm
ppc/9.1/SRPMS/sendmail-8.12.9-1.1mdk.src.rpm
SGI
Para las versiones de IRIX 6.5.15, 6.5.16, 6.5.17, 6.5.18 y 6.5.19, aplique el siguiente parche: 5046
ftp://patches.sgi.com/support/free/security/patches/
SCO
OpenServer 5.0.6
OpenServer 5.0.7
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11 |
Standar resources
|
Property |
Value |
CVE |
CAN-2003-0161 |
BID |
NULL |
Other resources
|
BUGTRAQ: Sendmail
http://marc.theaimsgroup.com/?l=bugtraq&m=104896621106790&w=2
CERT/CC: Buffer Overflow in Sendmail
http://www.cert.org/advisories/CA-2003-12.html
SCO Security Advisory SCOSA-2004.11
ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt |
Version history
|
Version |
Comments |
Date |
1.0
|
Aviso emitido
|
2003-03-31
|
1.1
|
Aviso emitido por SCO (SCOSA-2004.11)
|
2004-07-29
|