Vulnerability Bulletins |
Desbordamiento de búfer en Sendmail |
|
Vulnerability classification |
|
Property | Value |
Confidence level | Oficial |
Impact | Compromiso Root |
Dificulty | Avanzado |
Required attacker level | Acceso remoto sin cuenta a un servicio estandar |
System information |
|
Property | Value |
Affected manufacturer | GNU/Linux |
Affected software |
Sendmail Pro Sendmail Switch 2.1 < 2.1.6 Sendmail Switch 2.2 < 2.2.6 Sendmail Switch 3.0 < 3.0.4 Sendmail NT 2.X < 2.6.3 Sendmail NT 3.0 < 3.0.4 Sendmail GNU/Linux < 8.12.9 |
Description |
|
Se ha detectado una vulnerabilidad en Sendmail en la que un atacante remoto puede provocar una denegación de servicio e incluso puede ejecutar código arbitrario con privilegios de root. Esta vulnerabilidad viene dada por un error en el control de la longitud de las direcciones de correo. Un potencial atacante puede explotar dicha vulnerabilidad mediante el envío de un mensaje con un formato especial provocando un desbordamiento de pila. |
|
Solution |
|
Aplique los mecanismos de actualización propios de su distribución, o bien obtenga las fuentes del software y compílelo usted mismo. Actualización de software Sendmail Parches para las versiones de Sendmail (Open Source) 8.9, 8.10, 8.11 y 8.12 ftp://ftp.sendmail.org/pub/sendmail/prescan.tar.gz.uu Sendmail v. 8.12.9 ftp://ftp.sendmail.org/pub/sendmail/sendmail.8.12.9.tar.gz Aplique el parche de Sendmail (versión comercial) concerniente al desbordamiento de búfer en Sendmail Actualizaciones para Sendmail(versión comercial) http://www.sendmail.com/support/download/ FreeBSD Parche para FreeBSD 4.6, 4.7 y 5.0 ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:07/sendmail.patch Linux Slackware Parche para la última versión de Slackware ftp://ftp.slackware.com/pub/slackware/slackware-current/slackware/n/sendmail-8.12.8-i386-1.tgz Parche para Linux Slackware 8.1 ftp://ftp.slackware.com/pub/slackware/slackware-8.1/patches/packages/sendmail-8.12.8-i386-1.tgz Red Hat Linux 6.2 [arch]/sendmail-8.11.6-1.62.3.i386.rpm [arch]/sendmail-cf-8.11.6-1.62.3.i386.rpm [arch]/sendmail-doc-8.11.6-1.62.3.i386.rpm Red Hat Linux 7.0 [arch]/sendmail-8.11.6-25.70.i386.rpm [arch]/sendmail-cf-8.11.6-25.70.i386.rpm [arch]/sendmail-devel-8.11.6-25.70.i386.rpm [arch]/sendmail-doc-8.11.6-25.70.i386.rpm Red Hat Linux 7.1 [arch]/sendmail-8.11.6-25.71.i386.rpm [arch]/sendmail-cf-8.11.6-25.71.i386.rpm [arch]/sendmail-devel-8.11.6-25.71.i386.rpm [arch]/sendmail-doc-8.11.6-25.71.i386.rpm Red Hat Linux 7.2 [arch]/sendmail-8.11.6-25.72.i386.rpm [arch]/sendmail-cf-8.11.6-25.72.i386.rpm [arch]/sendmail-devel-8.11.6-25.72.i386.rpm [arch]/sendmail-doc-8.11.6-25.72.i386.rpm Red Hat Linux 7.3 [arch]/sendmail-8.11.6-25.73.i386.rpm [arch] /sendmail-cf-8.11.6-25.73.i386.rpm [arch]/sendmail-devel-8.11.6-25.73.i386.rpm [arch]/sendmail-doc-8.11.6-25.73.i386.rpm Red Hat Linux 8.0 [arch]/sendmail-8.12.8-5.80.i386.rpm [arch]/sendmail-cf-8.12.8-5.80.i386.rpm [arch]/sendmail-devel-8.12.8-5.80.i386.rpm [arch]/sendmail-doc-8.12.8-5.80.i386.rpm Red Hat Linux 9 [arch]/sendmail-8.12.8-5.90.i386.rpm [arch]/sendmail-cf-8.12.8-5.90.i386.rpm [arch]/sendmail-devel-8.12.8-5.90.i386.rpm [arch]/sendmail-doc-8.12.8-5.90.i386.rpm SUN Parche temporal de Sun: ftp://sunsolve.sun.com/cores/sendmail-01.tar.Z SuSE-8.1 : /update/8.1/rpm/i586/sendmail-8.12.6-109.[arch].rpm /update/8.1/rpm/i586/sendmail-8.12.6-109.[arch].patch.rpm (correctif) /update/8.1/rpm/src/sendmail-8.12.6-109.src.rpm (source) SuSE-8.0 : /update/8.0/n1/sendmail-8.12.3-75.[arch].rpm /update/8.0/n1/sendmail-8.12.3-75.[arch].patch.rpm (correctif) /update/8.0/zq1/sendmail-8.12.3-75.src.rpm (source) SuSE-7.3 : /update/7.3/n1/sendmail-8.11.6-164.[arch].rpm /update/7.3/sec2/sendmail-tls-8.11.6-166.[arch].rpm (correctif) /update/7.3/zq1/sendmail-8.11.6-164.src.rpm (source) /update/7.3/zq1/sendmail-tls-8.11.6-166.src.rpm SuSE-7.2 : /update/7.2/n1/sendmail-8.11.3-108.[arch].rpm /update/7.2/sec2/sendmail-tls-8.11.3-112.[arch].rpm (correctif) /update/7.2/zq1/sendmail-8.11.3-108.src.rpm (source) /update/7.2/zq1/sendmail-tls-8.11.3-112.src.rpm SuSE-7.1 : /update/7.1/n1/sendmail-8.11.2-45.[arch].rpm /update/7.1/sec2/sendmail-tls-8.11.2-47.[arch].rpm /update/7.1/zq1/sendmail-8.11.2-45.src.rpm /update/7.1/zq1/sendmail-tls-8.11.2-47.src.rpm Mandrake Corporate Server 2.1 : corporate/2.1/RPMS/sendmail-8.12.6-3.3mdk.i586.rpm corporate/2.1/RPMS/sendmail-cf-8.12.6-3.3mdk.i586.rpm corporate/2.1/RPMS/sendmail-devel-8.12.6-3.3mdk.i586.rpm corporate/2.1/RPMS/sendmail-doc-8.12.6-3.3mdk.i586.rpm corporate/2.1/SRPMS/sendmail-8.12.6-3.3mdk.src.rpm Mandrake Linux 8.2 : 8.2/RPMS/sendmail-8.12.1-4.3mdk.i586.rpm 8.2/RPMS/sendmail-cf-8.12.1-4.3mdk.i586.rpm 8.2/RPMS/sendmail-devel-8.12.1-4.3mdk.i586.rpm 8.2/RPMS/sendmail-doc-8.12.1-4.3mdk.i586.rpm 8.2/SRPMS/sendmail-8.12.1-4.3mdk.src.rpm Mandrake Linux 8.2/PPC : ppc/8.2/RPMS/sendmail-8.12.1-4.3mdk.ppc.rpm ppc/8.2/RPMS/sendmail-cf-8.12.1-4.3mdk.ppc.rpm ppc/8.2/RPMS/sendmail-devel-8.12.1-4.3mdk.ppc.rpm ppc/8.2/RPMS/sendmail-doc-8.12.1-4.3mdk.ppc.rpm ppc/8.2/SRPMS/sendmail-8.12.1-4.3mdk.src.rpm Mandrake Linux 9.0 : 9.0/RPMS/sendmail-8.12.6-3.3mdk.i586.rpm 9.0/RPMS/sendmail-cf-8.12.6-3.3mdk.i586.rpm 9.0/RPMS/sendmail-devel-8.12.6-3.3mdk.i586.rpm 9.0/RPMS/sendmail-doc-8.12.6-3.3mdk.i586.rpm 9.0/SRPMS/sendmail-8.12.6-3.3mdk.src.rpm Mandrake Linux 9.1 : 9.1/RPMS/sendmail-8.12.9-1.1mdk.i586.rpm 9.1/RPMS/sendmail-cf-8.12.9-1.1mdk.i586.rpm 9.1/RPMS/sendmail-devel-8.12.9-1.1mdk.i586.rpm 9.1/RPMS/sendmail-doc-8.12.9-1.1mdk.i586.rpm 9.1/SRPMS/sendmail-8.12.9-1.1mdk.src.rpm Mandrake Linux 9.1/PPC : ppc/9.1/RPMS/sendmail-8.12.9-1.1mdk.ppc.rpm ppc/9.1/RPMS/sendmail-cf-8.12.9-1.1mdk.ppc.rpm ppc/9.1/RPMS/sendmail-devel-8.12.9-1.1mdk.ppc.rpm ppc/9.1/RPMS/sendmail-doc-8.12.9-1.1mdk.ppc.rpm ppc/9.1/SRPMS/sendmail-8.12.9-1.1mdk.src.rpm SGI Para las versiones de IRIX 6.5.15, 6.5.16, 6.5.17, 6.5.18 y 6.5.19, aplique el siguiente parche: 5046 ftp://patches.sgi.com/support/free/security/patches/ SCO OpenServer 5.0.6 OpenServer 5.0.7 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11 |
|
Standar resources |
|
Property | Value |
CVE | CAN-2003-0161 |
BID | |
Other resources |
|
BUGTRAQ: Sendmail http://marc.theaimsgroup.com/?l=bugtraq&m=104896621106790&w=2 CERT/CC: Buffer Overflow in Sendmail http://www.cert.org/advisories/CA-2003-12.html SCO Security Advisory SCOSA-2004.11 ftp://ftp.sco.com/pub/updates/OpenServer/SCOSA-2004.11/SCOSA-2004.11.txt |
Version history |
||
Version | Comments | Date |
1.0 | Aviso emitido | 2003-03-31 |
1.1 | Aviso emitido por SCO (SCOSA-2004.11) | 2004-07-29 |