Re: *ALERT* UPDATED BID 3163 (URGENCY 6.58): Sendmail Debugger Arbitrary Code Execution Vulnerability (fwd)

From: Roman Drahtmueller (drahtat_private)
Date: Tue Aug 21 2001 - 12:28:37 PDT

  • Next message: snsadvat_private: "[SNS Advisory No.38] Trend Micro Virus Buster (Ver.3.5x) Remote File Disclosure With IUSER Privilege Vulnerability"

    >
    > Subject:      Sendmail Debugger Arbitrary Code Execution Vulnerability
    [...]
    > Vulnerable Systems:
    >
    >   Sendmail Consortium Sendmail 8.12beta7
    >   Sendmail Consortium Sendmail 8.12beta5
    >   Sendmail Consortium Sendmail 8.12beta16
    >   Sendmail Consortium Sendmail 8.12beta12
    >   Sendmail Consortium Sendmail 8.12beta10
    >   Sendmail Consortium Sendmail 8.11.5
    >   Sendmail Consortium Sendmail 8.11.4
    >   Sendmail Consortium Sendmail 8.11.3
    >   Sendmail Consortium Sendmail 8.11.2
    >   Sendmail Consortium Sendmail 8.11.1
    >   Sendmail Consortium Sendmail 8.11
    [...]
    > Non-Vulnerable Systems:
    
    Some part is missing here...
    
    > Summary:
    >
    >   Sendmail contains an input validation error, may lead to the  execution
    >   of arbitrary code with elevated privileges.
    [...]
    >   --------------------
    >   This vulnerability, present in sendmail open  source  versions  between
    >   8.11.0 and 8.11.5 has been corrected in 8.11.6.   sendmail  8.12.0.Beta
    >   users should upgrade to 8.12.0.Beta19.  The problem was not present  in
    >   8.10 or earlier versions.  However, as always, we recommend  using  the
    >   latest version.  Note that this problem is  not  remotely  exploitable.
    >   Additionally, sendmail 8.12 will no  longer  uses  a  set-user-id  root
    >   binary by default.
    >   --------------------
    [...]
    
    
    
    SuSE are currently working on update packages for the 7.0, 7.1 and 7.2
    distributions (which are affected). The supported distributions 6.3 and
    6.4 come with sendmail-8.9.3 which does not seem to be vulnerable to this
    problem. The packages should be available shortly at
    ftp://ftp.suse.com/pub/suse/i386/update/*.
    
    
    
    Offtopic and mentioned here to keep the noise down (in.telnetd):
    
     The 7.x distribution update directories contain update packages for the
    recently discovered in.telnetd security problem (buffer overflow).  While
    we are working for a solution for the 6.x distribution, the available
    packages are ready for use. It is recommended to apply these updates as
    soon as possible. The packages for the 7.1 distribution are called
    nkitserv.rpm, for 7.2 it's called telnet-server.rpm. The packages for the
    6.x distributions prove to worksome because of a much older codebase and
    changed behaviour of parts of the glibc. We hope to be able to provide a
    suitable solution soon.
    
    We recommend to disable the telnet service by commenting it out from the
    /etc/inetd.conf file (with a following "killall -HUP inetd" to make inetd
    re-read its config file) until an update package for your distribution is
    available. If you do not need the telnet server service, you should leave
    the service disabled even if you have applied an update package to your
    system.
    
    Thanks,
    Roman Drahtmüller,
    SuSE Security.
    -- 
     -                                                                      -
    | Roman Drahtmüller      <drahtat_private> //          "Caution: Cape does |
      SuSE GmbH - Security           Phone: //       not enable user to fly."
    | Nürnberg, Germany     +49-911-740530 // (Batman Costume warning label) |
     -                                                                      -
    



    This archive was generated by hypermail 2b30 : Tue Aug 21 2001 - 12:43:44 PDT