Executive Summary
Summary | |
---|---|
Title | New sendmail packages fix denial of service |
Informations | |||
---|---|---|---|
Name | DSA-1155 | First vendor Publication | 2006-08-24 |
Vendor | Debian | Last vendor Modification | 2006-08-24 |
Severity (Vendor) | N/A | Revision | 2 |
Security-Database Scoring CVSS v3
Cvss vector : N/A | |||
---|---|---|---|
Overall CVSS Score | NA | ||
Base Score | NA | Environmental Score | NA |
impact SubScore | NA | Temporal Score | NA |
Exploitabality Sub Score | NA | ||
Calculate full CVSS 3.0 Vectors scores |
Security-Database Scoring CVSS v2
Cvss vector : (AV:N/AC:L/Au:N/C:N/I:N/A:P) | |||
---|---|---|---|
Cvss Base Score | 5 | Attack Range | Network |
Cvss Impact Score | 2.9 | Attack Complexity | Low |
Cvss Expoit Score | 10 | Authentication | None Required |
Calculate full CVSS 2.0 Vectors scores |
Detail
It turned out that the sendmail binary depends on libsasl2 (>= 2.1.19.dfsg1) which is neither available in the stable nor in the the security archive. This version is scheduled for the inclusion in the next update of the stable release, though. You'll have to download the referenced file for your architecture from below and install it with dpkg -i. As an alternative, temporarily adding the following line to /etc/apt/sources.list will mitigate the problem as well: deb http://ftp.debian.de/debian stable-proposed-updates main Here is the original security advisory for completeness: Frank Sheiness discovered that a MIME conversion routine in sendmail, a powerful, efficient, and scalable mail transport agent, could be tricked by a specially crafted mail to perform an endless recursion. For the stable distribution (sarge) this problem has been fixed in version 8.13.4-3sarge2. For the unstable distribution (sid) this problem has been fixed in version 8.13.7-1. We recommend that you upgrade your sendmail package. |
Original Source
Url : http://www.debian.org/security/2006/dsa-1155 |
CAPEC : Common Attack Pattern Enumeration & Classification
Id | Name |
---|---|
CAPEC-2 | Inducing Account Lockout |
CAPEC-82 | Violating Implicit Assumptions Regarding XML Content (aka XML Denial of Servi... |
CAPEC-147 | XML Ping of Death |
CAPEC-228 | Resource Depletion through DTD Injection in a SOAP Message |
CWE : Common Weakness Enumeration
% | Id | Name |
---|---|---|
100 % | CWE-399 | Resource Management Errors |
OVAL Definitions
Definition Id: oval:org.mitre.oval:def:11253 | |||
Oval ID: | oval:org.mitre.oval:def:11253 | ||
Title: | Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files. | ||
Description: | Sendmail before 8.13.7 allows remote attackers to cause a denial of service via deeply nested, malformed multipart MIME messages that exhaust the stack during the recursive mime8to7 function for performing 8-bit to 7-bit conversion, which prevents Sendmail from delivering queued messages and might lead to disk consumption by core dump files. | ||
Family: | unix | Class: | vulnerability |
Reference(s): | CVE-2006-1173 | Version: | 5 |
Platform(s): | Red Hat Enterprise Linux 3 CentOS Linux 3 Red Hat Enterprise Linux 4 CentOS Linux 4 Oracle Linux 4 | Product(s): | |
Definition Synopsis: | |||
|
CPE : Common Platform Enumeration
OpenVAS Exploits
Date | Description |
---|---|
2008-09-24 | Name : Gentoo Security Advisory GLSA 200606-19 (sendmail) File : nvt/glsa_200606_19.nasl |
2008-09-04 | Name : FreeBSD Security Advisory (FreeBSD-SA-06:17.sendmail.asc) File : nvt/freebsdsa_sendmail2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1155-1 (sendmail) File : nvt/deb_1155_1.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1155-2 (sendmail) File : nvt/deb_1155_2.nasl |
2008-01-17 | Name : Debian Security Advisory DSA 1164-1 (sendmail) File : nvt/deb_1164_1.nasl |
0000-00-00 | Name : Slackware Advisory SSA:2006-166-01 sendmail File : nvt/esoft_slk_ssa_2006_166_01.nasl |
Open Source Vulnerability Database (OSVDB)
Id | Description |
---|---|
26197 | Sendmail Multi-Part MIME Message Handling DoS sendmail contains a flaw that may allow a remote denial of service. The issue is triggered when an attacker sends a specially-crafted, deeply nested multipart MIME message which exhausts the stack while performing an 8-bit to 7-bit conversion, and will result in loss of availability for the service. |
Nessus® Vulnerability Scanner
Date | Description |
---|---|
2013-03-13 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U477911.nasl - Type : ACT_GATHER_INFO |
2013-03-13 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U497412.nasl - Type : ACT_GATHER_INFO |
2007-12-03 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U806039.nasl - Type : ACT_GATHER_INFO |
2007-12-03 | Name : The remote AIX host is missing a vendor-supplied security patch. File : aix_U807468.nasl - Type : ACT_GATHER_INFO |
2007-02-18 | Name : The remote host is missing a vendor-supplied security patch File : suse_SA_2006_032.nasl - Type : ACT_GATHER_INFO |
2007-01-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2006-836.nasl - Type : ACT_GATHER_INFO |
2007-01-17 | Name : The remote Fedora Core host is missing a security update. File : fedora_2006-837.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1155.nasl - Type : ACT_GATHER_INFO |
2006-10-14 | Name : The remote Debian host is missing a security-related update. File : debian_DSA-1164.nasl - Type : ACT_GATHER_INFO |
2006-08-08 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_34689.nasl - Type : ACT_GATHER_INFO |
2006-08-08 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_34900.nasl - Type : ACT_GATHER_INFO |
2006-08-08 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_34927.nasl - Type : ACT_GATHER_INFO |
2006-08-08 | Name : The remote HP-UX host is missing a security-related patch. File : hpux_PHNE_34936.nasl - Type : ACT_GATHER_INFO |
2006-07-03 | Name : The remote CentOS host is missing one or more security updates. File : centos_RHSA-2006-0515.nasl - Type : ACT_GATHER_INFO |
2006-06-16 | Name : The remote Gentoo host is missing one or more security-related patches. File : gentoo_GLSA-200606-19.nasl - Type : ACT_GATHER_INFO |
2006-06-16 | Name : The remote Mandrake Linux host is missing one or more security updates. File : mandrake_MDKSA-2006-104.nasl - Type : ACT_GATHER_INFO |
2006-06-16 | Name : The remote Red Hat host is missing one or more security updates. File : redhat-RHSA-2006-0515.nasl - Type : ACT_GATHER_INFO |
2006-06-16 | Name : The remote Slackware host is missing a security update. File : Slackware_SSA_2006-166-01.nasl - Type : ACT_GATHER_INFO |
2004-07-12 | Name : The remote host is missing Sun Security Patch number 113575-11 File : solaris9_113575.nasl - Type : ACT_GATHER_INFO |
2004-07-12 | Name : The remote host is missing Sun Security Patch number 114137-10 File : solaris9_x86_114137.nasl - Type : ACT_GATHER_INFO |
Alert History
Date | Informations |
---|---|
2014-02-17 11:26:08 |
|