Executive Summary
Summary | |
---|---|
Title | sendmail security and bug fix update |
Informations | |||
---|---|---|---|
Name | RHSA-2011:0262 | First vendor Publication | 2011-02-16 |
Vendor | RedHat | Last vendor Modification | 2011-02-16 |
Severity (Vendor) | Low | Revision | 01 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:P/I:P/A:P) | |||
---|---|---|---|
Cvss Base Score | 7.5 | Attack Range | Network |
Cvss Impact Score | 6.4 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
Problem Description: Updated sendmail packages that fix one security issue and three bugs are now available for Red Hat Enterprise Linux 4. The Red Hat Security Response Team has rated this update as having low security impact. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available from the CVE link in the References section. 2. Relevant releases/architectures: Red Hat Enterprise Linux AS version 4 - i386, ia64, ppc, s390, s390x, x86_64 Red Hat Enterprise Linux Desktop version 4 - i386, x86_64 Red Hat Enterprise Linux ES version 4 - i386, ia64, x86_64 Red Hat Enterprise Linux WS version 4 - i386, ia64, x86_64 3. Description: Sendmail is a Mail Transport Agent (MTA) used to send mail between machines. A flaw was found in the way sendmail handled NUL characters in the CommonName field of X.509 certificates. An attacker able to get a carefully-crafted certificate signed by a trusted Certificate Authority could trick sendmail into accepting it by mistake, allowing the attacker to perform a man-in-the-middle attack or bypass intended client certificate authentication. (CVE-2009-4565) The CVE-2009-4565 issue only affected configurations using TLS with certificate verification and CommonName checking enabled, which is not a typical configuration. This update also fixes the following bugs: * Previously, sendmail did not correctly handle mail messages that had a long first header line. A line with more than 2048 characters was split, causing the part of the line exceeding the limit, as well as all of the following mail headers, to be incorrectly handled as the message body. (BZ#499450) * When an SMTP-sender is sending mail data to sendmail, it may spool that data to a file in the mail queue. It was found that, if the SMTP-sender stopped sending data and a timeout occurred, the file may have been left stalled in the mail queue, instead of being deleted. This update may not correct this issue for every situation and configuration. Refer to the Solution section for further information. (BZ#434645) * Previously, the sendmail macro MAXHOSTNAMELEN used 64 characters as the limit for the hostname length. However, in some cases, it was used against an FQDN length, which has a maximum length of 255 characters. With this update, the MAXHOSTNAMELEN limit has been changed to 255. (BZ#485380) All sendmail users should upgrade to these updated packages, which contain backported patches to correct these issues. After installing this update, sendmail will be restarted automatically. 4. Solution: As part of the fix for BZ#434645, a script called purge-mqueue is shipped with this update. It is located in the /usr/share/sendmail/ directory. The primary purpose of this script is a one-time clean up of the mqueue from stalled files that were created before the installation of this update. By default, the script removes all files from /var/spool/mqueue/ that have an atime older than one month. It requires the tmpwatch package to be installed. If you have stalled files in your mqueue you can run this script or clean them manually. It is also possible to use this script as a cron job (for example, by copying it to /etc/cron.daily/), but it should not be needed in most cases, because this update should prevent the creation of new stalled files. Before applying this update, make sure all previously-released errata relevant to your system have been applied. This update is available via the Red Hat Network. Details on how to use the Red Hat Network to apply this update are available at http://kbase.redhat.com/faq/docs/DOC-11259 5. Bugs fixed (http://bugzilla.redhat.com/): 434645 - DATA timeouts leave behind stale df files in mqueue 485380 - sendmail applies MAXHOSTNAMELEN for FQDN. 552622 - CVE-2009-4565 sendmail: incorrect verification of SSL certificate with NUL in name |
Original Source
Url : https://rhn.redhat.com/errata/RHSA-2011-0262.html |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-310 | Cryptographic Issues |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:10255 | |||
Oval ID: | oval:org.mitre.oval:def:10255 | ||
Title: | sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | ||
Description: | sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-4565 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 5 CentOS Linux 5 Oracle Linux 5 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:11822 | |||
Oval ID: | oval:org.mitre.oval:def:11822 | ||
Title: | HP-UX Running sendmail with STARTTLS Enabled, Remote Unauthorized Access. | ||
Description: | sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2009-4565 | Version: | 11 |
Platform(s): | HP-UX 11 | Product(s): | |
Definition Synopsis: | |||
|
Definition Id: oval:org.mitre.oval:def:20232 | |||
Oval ID: | oval:org.mitre.oval:def:20232 | ||
Title: | DSA-1985-1 sendmail - insufficient input validation | ||
Description: | It was discovered that sendmail, a Mail Transport Agent, does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1985-1 CVE-2009-4565 | Version: | 5 |
Platform(s): | Debian GNU/Linux 4.0 Debian GNU/Linux 5.0 | Product(s): | sendmail |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:22058 | |||
Oval ID: | oval:org.mitre.oval:def:22058 | ||
Title: | RHSA-2010:0237: sendmail security and bug fix update (Low) | ||
Description: | sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | ||
Family: | unix | Class: | patch |
Reference(s): | RHSA-2010:0237-05 CVE-2006-7176 CVE-2009-4565 | Version: | 29 |
Platform(s): | Red Hat Enterprise Linux 5 | Product(s): | sendmail |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:23064 | |||
Oval ID: | oval:org.mitre.oval:def:23064 | ||
Title: | ELSA-2010:0237: sendmail security and bug fix update (Low) | ||
Description: | sendmail before 8.14.4 does not properly handle a '\0' character in a Common Name (CN) field of an X.509 certificate, which (1) allows man-in-the-middle attackers to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and (2) allows remote attackers to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority, a related issue to CVE-2009-2408. | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010:0237-05 CVE-2006-7176 CVE-2009-4565 | Version: | 13 |
Platform(s): | Oracle Linux 5 | Product(s): | sendmail |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:27847 | |||
Oval ID: | oval:org.mitre.oval:def:27847 | ||
Title: | DEPRECATED: ELSA-2010-0237 -- sendmail security and bug fix update (low) | ||
Description: | [8.13.8-8] - rpm attributes S,5,T not recorded for statistics file [8.13.8-7] - fix specfile for passing rpm -V test (#555277) [8.13.8-6.el5] - fix verification of SSL certificate with NUL in name (#553618, CVE-2009-4565) - do not accept localhost.localdomain as valid address from smtp (#449391) - skip colon separator when parsing service name in ServiceSwitchFile (#512871) - exit with non-zero error code when free space is low (#299951) - fix -qG description in man page (#250552) - fix comments in sendmail.mc to use correct certs path (#244012) - add MTA to provides (#494408) - fix %dist macro use (#440616) - compile with -fno-strict-aliasing - skip t-sem test as it doesn't allow parallel testing | ||
Family: | unix | Class: | patch |
Reference(s): | ELSA-2010-0237 CVE-2006-7176 CVE-2009-4565 | Version: | 4 |
Platform(s): | Oracle Linux 5 | Product(s): | sendmail |
Definition Synopsis: | |||
Definition Id: oval:org.mitre.oval:def:6719 | |||
Oval ID: | oval:org.mitre.oval:def:6719 | ||
Title: | DSA-1985 sendmail -- insufficient input validation | ||
Description: | It was discovered that sendmail, a Mail Transport Agent, does not properly handle a "\0" character in a Common Name field of an X.509 certificate. This allows an attacker to spoof arbitrary SSL-based SMTP servers via a crafted server certificate issued by a legitimate Certification Authority, and to bypass intended access restrictions via a crafted client certificate issued by a legitimate Certification Authority. | ||
Family: | unix | Class: | patch |
Reference(s): | DSA-1985 CVE-2009-4565 | Version: | 5 |
Platform(s): | Debian GNU/Linux 5.0 Debian GNU/Linux 4.0 | Product(s): | sendmail |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2012-08-10 | Name : Gentoo Security Advisory GLSA 201206-30 (sendmail) File : nvt/glsa_201206_30.nasl |
2011-02-18 | Name : RedHat Update for sendmail RHSA-2011:0262-01 File : nvt/gb_RHSA-2011_0262-01_sendmail.nasl |
2010-06-25 | Name : Fedora Update for sendmail FEDORA-2010-5470 File : nvt/gb_fedora_2010_5470_sendmail_fc12.nasl |
2010-06-18 | Name : Fedora Update for sendmail FEDORA-2010-5399 File : nvt/gb_fedora_2010_5399_sendmail_fc11.nasl |
2010-04-06 | Name : RedHat Update for sendmail RHSA-2010:0237-05 File : nvt/gb_RHSA-2010_0237-05_sendmail.nasl |
2010-03-31 | Name : HP-UX Update for sendmail with STARTTLS Enabled HPSBUX02508 File : nvt/gb_hp_ux_HPSBUX02508.nasl |
2010-01-19 | Name : Mandriva Update for sendmail MDVSA-2010:003 (sendmail) File : nvt/gb_mandriva_MDVSA_2010_003.nasl |
2010-01-04 | Name : Sendmail NULL Character CA SSL Certificate Validation Security Bypass Vulnera... File : nvt/sendmail_37543.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
62373 | Sendmail X.509 Certificate Null Character MiTM Spoofing Weakness |
Information Assurance Vulnerability Management (IAVM)
Date | Description |
---|---|
2010-01-07 | IAVM : 2010-A-0002 - Sendmail SSL Certificate Validation Vulnerability Severity : Category I - VMSKEY : V0022182 |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-07-12 | Name : The remote Oracle Linux host is missing one or more security updates. File : oraclelinux_ELSA-2011-0262.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IZ72510.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IZ72837.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IZ72836.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IZ72835.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IZ72528.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IZ72515.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IZ72834.nasl - Type : ACT_GATHER_INFO |
2013-01-24 | Name : The remote AIX host is missing a security patch. File : aix_IZ70637.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20110216_sendmail_on_SL4_x.nasl - Type : ACT_GATHER_INFO |
2012-08-01 | Name : The remote Scientific Linux host is missing one or more security updates. File : sl_20100330_sendmail_on_SL5_x.nasl - Type : ACT_GATHER_INFO |
2012-06-26 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-201206-30.nasl - Type : ACT_GATHER_INFO |
2011-04-22 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2011-0262.nasl - Type : ACT_GATHER_INFO |
2010-10-11 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_sendmail-6860.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-5470.nasl - Type : ACT_GATHER_INFO |
2010-07-01 | Name : The remote Fedora host is missing a security update. File : fedora_2010-5399.nasl - Type : ACT_GATHER_INFO |
2010-05-11 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2010-0237.nasl - Type : ACT_GATHER_INFO |
2010-03-02 | Name : The remote SuSE 9 host is missing a security-related patch. File : suse9_12590.nasl - Type : ACT_GATHER_INFO |
2010-03-01 | Name : The remote openSUSE host is missing a security update. File : suse_11_0_rmail-100218.nasl - Type : ACT_GATHER_INFO |
2010-03-01 | Name : The remote openSUSE host is missing a security update. File : suse_11_1_rmail-100218.nasl - Type : ACT_GATHER_INFO |
2010-03-01 | Name : The remote openSUSE host is missing a security update. File : suse_11_2_rmail-100218.nasl - Type : ACT_GATHER_INFO |
2010-03-01 | Name : The remote SuSE 11 host is missing a security update. File : suse_11_rmail-100218.nasl - Type : ACT_GATHER_INFO |
2010-03-01 | Name : The remote SuSE 10 host is missing a security-related patch. File : suse_sendmail-6859.nasl - Type : ACT_GATHER_INFO |
2010-02-24 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1985.nasl - Type : ACT_GATHER_INFO |
2010-01-13 | Name : The remote Mandriva Linux host is missing one or more security updates. File : mandriva_MDVSA-2010-003.nasl - Type : ACT_GATHER_INFO |
2010-01-05 | Name : The remote mail server is susceptible to a man-in-the-middle attack. File : sendmail_8_14_4.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:54:22 |
|