Rapid7 Vulnerability & Exploit Database

RHSA-2010:0237: sendmail security and bug fix update

Back to Search

RHSA-2010:0237: sendmail security and bug fix update

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:P/I:P/A:P)
Published
01/04/2010
Created
07/25/2018
Added
04/06/2010
Modified
07/04/2017

Description

Sendmail is a very widely used Mail Transport Agent (MTA). MTAs delivermail from one machine to another. Sendmail is not a client program, butrather a behind-the-scenes daemon that moves email over networks or theInternet to its final destination.The configuration of sendmail in Red Hat Enterprise Linux was found to notreject the "localhost.localdomain" domain name for email messages that comefrom external hosts. This could allow remote attackers to disguise spoofedmessages. (CVE-2006-7176)A flaw was found in the way sendmail handled NUL characters in theCommonName field of X.509 certificates. An attacker able to get acarefully-crafted certificate signed by a trusted Certificate Authoritycould trick sendmail into accepting it by mistake, allowing the attacker toperform a man-in-the-middle attack or bypass intended client certificateauthentication. (CVE-2009-4565)Note: The CVE-2009-4565 issue only affected configurations using TLS withcertificate verification and CommonName checking enabled, which is not atypical configuration.This update also fixes the following bugs:All users of sendmail are advised to upgrade to these updated packages,which resolve these issues.

Solution(s)

  • redhat-upgrade-sendmail
  • redhat-upgrade-sendmail-cf
  • redhat-upgrade-sendmail-devel
  • redhat-upgrade-sendmail-doc

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;