Rapid7 Vulnerability & Exploit Database

CESA-2003:121: sendmail security update

Back to Search

CESA-2003:121: sendmail security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
04/02/2003
Created
07/25/2018
Added
03/12/2010
Modified
07/04/2017

Description

Updated Sendmail packages are available to fix a vulnerability that allows local and possibly remote attackers to gain root privileges.

Sendmail is a widely used Mail Transport Agent (MTA) which is included in all CentOS Linux distributions. There is a vulnerability in Sendmail versions 8.12.8 and prior. The address parser performs insufficient bounds checking in certain conditions due to a char to int conversion, making it possible for an attacker to take control of the application. Although no exploit currently exists, this issue is probably locally exploitable and may be remotely exploitable. All users are advised to update to these erratum packages containing a backported patch which corrects these vulnerabilities. CentOS would like to thank Michal Zalewski for finding and reporting this issue.

Solution(s)

  • centos-upgrade-sendmail
  • centos-upgrade-sendmail-cf
  • centos-upgrade-sendmail-devel
  • centos-upgrade-sendmail-doc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;