Rapid7 Vulnerability & Exploit Database

RHSA-2003:284: sendmail security update

Back to Search

RHSA-2003:284: sendmail security update

Severity
10
CVSS
(AV:N/AC:L/Au:N/C:C/I:C/A:C)
Published
10/06/2003
Created
07/25/2018
Added
10/28/2005
Modified
07/12/2017

Description

Updated Sendmail packages that fix a potentially-exploitable vulnerability are now available.

Sendmail is a widely used Mail Transport Agent (MTA) and is included in all Red Hat Enterprise Linux distributions. There is a bug in the prescan() function of Sendmail versions prior to and including 8.12.9. The sucessful exploitation of this bug can lead to heap and stack structure overflows. Although no exploit currently exists, this issue is locally exploitable and may also be remotely exploitable. The Common Vulnerabilities and Exposures project (cve.mitre.org) has assigned the name CAN-2003-0694 to this issue. All users are advised to update to these erratum packages containing a backported patch which corrects these vulnerabilities. Red Hat would like to thank Michal Zalewski for finding and reporting this issue.

Solution(s)

  • redhat-upgrade-sendmail
  • redhat-upgrade-sendmail-cf
  • redhat-upgrade-sendmail-devel
  • redhat-upgrade-sendmail-doc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;