Executive Summary
Summary | |
---|---|
Title | New sendmail packages fix DoS and arbitrary code execution |
Informations | |||
---|---|---|---|
Name | DSA-278 | First vendor Publication | 2003-04-04 |
Vendor | Debian | Last vendor Modification | 2003-04-04 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:C/I:C/A:C) | |||
---|---|---|---|
Cvss Base Score | 10 | Attack Range | Network |
Cvss Impact Score | 10 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
This is a major brown paperbag update. The old packages for the stable distribution (woody) did not work as expected and you should only update to the neww packages mentioned in this advisory. The packages in the old stable distribution (potato) are working properly. I'm awfully sorry for the inconvenience. At the moment updated packages are only available for alpha, i386 and sparc. The original advisory was: Michal Zalewski discovered a buffer overflow, triggered by a char to int conversion, in the address parsing code in sendmail, a widely used powerful, efficient, and scalable mail transport agent. This problem is potentially remotely exploitable. For the stable distribution (woody) this problem has been fixed in version 8.12.3-6.3. We recommend that you upgrade your sendmail packages. |
Original Source
Url : http://www.debian.org/security/2003/dsa-278 |
CWE : Common Weakness Enumeration
% | Id | Name |
---|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-01-17 | Name : Debian Security Advisory DSA 278-1 (sendmail) File : nvt/deb_278_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 278-2 (sendmail) File : nvt/deb_278_2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 290-1 (sendmail-wide) File : nvt/deb_290_1.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
8294 | Sendmail NOCHAR Control Value prescan Overflow A remote overflow exists in Sendmail. Due to a vulnerable char to int conversion it is possible to use the NOCHAR control value to bypass the length check done by the prescan function resulting in a buffer overflow. With a specially crafted request, an attacker can execute arbitrary code resulting in a loss of integrity. |
Snort® IPS/IDS
Date | Description |
---|---|
2014-01-10 | Sendmail RCPT TO prescan too long addresses overflow RuleID : 2270-community - Revision : 18 - Type : SERVER-MAIL |
2014-01-10 | Sendmail RCPT TO prescan too long addresses overflow RuleID : 2270 - Revision : 18 - Type : SERVER-MAIL |
2014-01-10 | Sendmail MAIL FROM prescan too long addresses overflow RuleID : 2268-community - Revision : 16 - Type : SERVER-MAIL |
2014-01-10 | Sendmail MAIL FROM prescan too long addresses overflow RuleID : 2268 - Revision : 16 - Type : SERVER-MAIL |
2014-01-10 | Sendmail SOML FROM prescan too long addresses overflow RuleID : 2266-community - Revision : 16 - Type : SERVER-MAIL |
2014-01-10 | Sendmail SOML FROM prescan too long addresses overflow RuleID : 2266 - Revision : 16 - Type : SERVER-MAIL |
2014-01-10 | Sendmail SAML FROM prescan too long addresses overflow RuleID : 2264-community - Revision : 16 - Type : SERVER-MAIL |
2014-01-10 | Sendmail SAML FROM prescan too long addresses overflow RuleID : 2264 - Revision : 16 - Type : SERVER-MAIL |
2014-01-10 | Sendmail SEND FROM prescan too long addresses overflow RuleID : 2262-community - Revision : 16 - Type : SERVER-MAIL |
2014-01-10 | Sendmail SEND FROM prescan too long addresses overflow RuleID : 2262 - Revision : 16 - Type : SERVER-MAIL |
2014-01-10 | VRFY overflow attempt RuleID : 2260-community - Revision : 17 - Type : SERVER-MAIL |
2014-01-10 | VRFY overflow attempt RuleID : 2260 - Revision : 17 - Type : SERVER-MAIL |
2014-01-10 | EXPN overflow attempt RuleID : 2259-community - Revision : 17 - Type : SERVER-MAIL |
2014-01-10 | EXPN overflow attempt RuleID : 2259 - Revision : 17 - Type : SERVER-MAIL |
2014-01-10 | Sendmail Content-Transfer-Encoding overflow attempt RuleID : 2183-community - Revision : 16 - Type : SERVER-MAIL |
2014-01-10 | Sendmail Content-Transfer-Encoding overflow attempt RuleID : 2183 - Revision : 16 - Type : SERVER-MAIL |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2007-09-25 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_35483.nasl - Type : ACT_GATHER_INFO |
2007-09-25 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_35484.nasl - Type : ACT_GATHER_INFO |
2005-02-16 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_28409.nasl - Type : ACT_GATHER_INFO |
2005-02-16 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_29526.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-278.nasl - Type : ACT_GATHER_INFO |
2004-09-29 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-290.nasl - Type : ACT_GATHER_INFO |
2004-07-31 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2003-042.nasl - Type : ACT_GATHER_INFO |
2004-07-06 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2003-121.nasl - Type : ACT_GATHER_INFO |
2003-03-29 | Name : Arbitrary code may be run on the remote server File : sendmail_conversion_overflow.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:32:15 |
|