Rapid7 Vulnerability & Exploit Database

RHSA-2003:283: Updated Sendmail packages fix vulnerability.

Back to Search

RHSA-2003:283: Updated Sendmail packages fix vulnerability.

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
10/06/2003
Created
07/25/2018
Added
10/28/2005
Modified
07/04/2017

Description

Updated Sendmail packages that fix a potentially-exploitable vulnerability are now available.

Sendmail is a widely used Mail Transport Agent (MTA) and is included in all Red Hat Linux distributions. Michal Zalewski found a bug in the prescan() function of unpatched Sendmail versions prior to 8.12.10. The sucessful exploitation of this bug can lead to heap and stack structure overflows. Although no exploit currently exists, this issue is locally exploitable and may also be remotely exploitable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0694 to this issue. Additionally, for Red Hat Linux 8.0 and 9 we have included a fix for a potential buffer overflow in ruleset parsing. This problem is not exploitable in the default sendmail configuration; it is exploitable only if non-standard rulesets recipient (2), final (4), or mailer-specific envelope recipients rulesets are used. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0681 to this issue. All users are advised to update to these erratum packages containing a backported patch which corrects these vulnerabilities.

Solution(s)

  • redhat-upgrade-sendmail
  • redhat-upgrade-sendmail-cf
  • redhat-upgrade-sendmail-devel
  • redhat-upgrade-sendmail-doc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;