Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Debian: sendmail-wide buffer overflow vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by Team   
Debian There is a buffer overflow, triggered by a char to int conversion, in the address parsing code in sendmail.

- --------------------------------------------------------------------------
Debian Security Advisory DSA 290-1                                        Martin Schulze
April 17th, 2003               
- --------------------------------------------------------------------------

Package        : sendmail-wide
Vulnerability  : char-to-int conversion
Problem-Type   : local, maybe remote
Debian-specific: no
CVE Id         : CAN-2003-0161
CERT advisories: VU#897604 CA-2003-12

Michal Zalewski discovered a buffer overflow, triggered by a char to
int conversion, in the address parsing code in sendmail, a widely used
powerful, efficient, and scalable mail transport agent.  This problem
is potentially remotely exploitable.

For the stable distribution (woody) this problem has been fixed in
version 8.12.3+3.5Wbeta-5.4

For the old stable distribution (potato) this problem has been
fixed in version 8.9.3+3.2W-25

For the unstable distribution (sid) this problem has been
fixed in version 8.12.9+3.5Wbeta-1

We recommend that you upgrade your sendmail-wide packages.

Upgrade Instructions
- --------------------

wget url
        will fetch the file for you
dpkg -i file.deb
        will install the referenced file.

If you are using the apt-get package manager, use the line for
sources.list as given below:

apt-get update
        will update the internal database
apt-get upgrade
        will install corrected packages

You may use an automated update by adding the resources from the
footer to the proper configuration.

Debian GNU/Linux 2.2 alias potato
- ---------------------------------

  Source archives:
      Size/MD5 checksum:      541 17dd53835e894bc4213d2555384aff75
      Size/MD5 checksum:  1273704 63cd21c58e45810b21601025c164a85e

  Alpha architecture:
      Size/MD5 checksum:   302722 8b36867359dd0267d8664b290899ec6b

  Intel IA-32 architecture:
      Size/MD5 checksum:   217690 f98998b9467ce368b11a862dbe5d4e82

  Motorola 680x0 architecture:
      Size/MD5 checksum:   202538 e56cc6579ae7da5693047a7e9ceec33e

  PowerPC architecture:
      Size/MD5 checksum:   242694 33217654adca1e26bf9e27b4fb96050e

  Sun Sparc architecture:
      Size/MD5 checksum:   236530 32fabe460c63c6fd343d4741104a73f3

Debian GNU/Linux 3.0 alias woody
- --------------------------------

  Source archives:
      Size/MD5 checksum:      738 26af096d7a10d63aec72a0b38982973d
      Size/MD5 checksum:   326292 b98e1e9bb74233e1842a0562912b748d
      Size/MD5 checksum:  1870451 4c7036e8042bae10a90da4a84a717963

  Alpha architecture:
      Size/MD5 checksum:   440622 d2800104eff39be1a94b94d049e77fc1

  ARM architecture:
      Size/MD5 checksum:   369412 d63f3107518282fc892835c5251afdcd

  Intel IA-32 architecture:
      Size/MD5 checksum:   328794 139dcce3e908b45be6ecd74531279184

  Intel IA-64 architecture:
      Size/MD5 checksum:   574908 7ebf517265802b0abaf41d3eeca27b6d

  HP Precision architecture:
      Size/MD5 checksum:   413604 9f353dbc5f1c3eca9e34da0e34f227c5

  Motorola 680x0 architecture:
      Size/MD5 checksum:   300726 6b9f6f9c143f2ae0d5e3b95c9e74d90e

  Big endian MIPS architecture:
      Size/MD5 checksum:   378324 22c8467712e9da461043110a86c23dcc

  Little endian MIPS architecture:
      Size/MD5 checksum:   380264 ae297336eb7a608f4cdacb3b5cdbf4aa

  PowerPC architecture:
      Size/MD5 checksum:   362854 522d8c46a0e8e6b6c143e6e7eac502e6

  IBM S/390 architecture:
      Size/MD5 checksum:   354776 62f538f78d8d17519c74064473cad1c2

  Sun Sparc architecture:
      Size/MD5 checksum:   355964 01de0e06a7bc0fde26b08b7d84e53246

  These files will probably be moved into the stable distribution on
  its next revision.

- ---------------------------------------------------------------------------------
For apt-get: deb stable/updates main
For dpkg-ftp: dists/stable/updates/main
Mailing list:
Package info: `apt-cache show ' and

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
FBI Quietly Removes Recommendation To Encrypt Your Phone
And the prize for LEAST SECURE BROWSER goes to ... Chrome!
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.