Rapid7 Vulnerability & Exploit Database

CESA-2003:074: sendmail security update

Back to Search

CESA-2003:074: sendmail security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
03/07/2003
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated Sendmail packages are available to fix a vulnerability that may allow remote attackers to gain root privileges by sending a carefully crafted message. [Updated March 18 2003] Added packages for CentOS Linux ES and CentOS Linux WS.

Sendmail is a widely used Mail Transport Agent (MTA) which is included in all CentOS Linux distributions. During a code audit of Sendmail by ISS, a critical vulnerability was uncovered that affects unpatched versions of Sendmail prior to version 8.12.8. A remote attacker can send a carefully crafted email message which, when processed by sendmail, causes arbitrary code to be executed as root. We are advised that a proof-of-concept exploit is known to exist, but is not believed to be in the wild. Since this is a message-based vulnerability, MTAs other than Sendmail may pass on the carefully crafted message. This means that unpatched versions of Sendmail inside a network could still be at risk even if they do not accept external connections directly. All users are advised to update to these erratum packages which contain a backported patch to correct this vulnerability. CentOS would like to thank Eric Allman for his assistance with this vulnerability.

Solution(s)

  • centos-upgrade-sendmail
  • centos-upgrade-sendmail-cf
  • centos-upgrade-sendmail-devel
  • centos-upgrade-sendmail-doc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;