GLSA: sendmail

From: Daniel Ahlberg (alizat_private)
Date: Sun Oct 13 2002 - 07:48:21 PDT

  • Next message: pyramid-rpat_private: "Pyramid Research Project - ghttpd security advisorie"

    -----BEGIN PGP SIGNED MESSAGE-----
    Hash: SHA1
    
    - - --------------------------------------------------------------------
    GENTOO LINUX SECURITY ANNOUNCEMENT
    - - --------------------------------------------------------------------
    
    PACKAGE        :sendmail
    SUMMARY        :smsrh bypass vulnerabilites
    DATE           :2002-10-13 14:45 UTC
    
    - - --------------------------------------------------------------------
    
    It is possible for an attacker to bypass the restrictions imposed by
    The Sendmail Consortium’s Restricted Shell (SMRSH) and execute a
    binary of his choosing by inserting a special character sequence into
    his .forward file.
    
    Read the full advisory at
    http://www.sendmail.org/smrsh.adv.txt
    
    SOLUTION
    
    It is recommended that all Gentoo Linux users who are running
    net-mail/sendmail-8.12.6 and earlier update their systems
    as follows:
    
    emerge rsync
    emerge sendmail
    emerge clean
    
    - - --------------------------------------------------------------------
    alizat_private - GnuPG key is available at www.gentoo.org/~aliz
    - - --------------------------------------------------------------------
    -----BEGIN PGP SIGNATURE-----
    Version: GnuPG v1.0.7 (GNU/Linux)
    
    iD8DBQE9qYe0fT7nyhUpoZMRAikZAJ401MoPiOSGimzqUq25IPj7sNIrIwCghsXn
    pXPevOcEyJm89c2k67OIA9g=
    =8Hz5
    -----END PGP SIGNATURE-----
    



    This archive was generated by hypermail 2b30 : Mon Oct 14 2002 - 15:31:31 PDT