Share your story
The central voice for Linux and Open Source security news
Home News Topics Advisories HOWTOs Features Newsletters About Register

Sign up!
EnGarde Community
What is the most important Linux security technology?
Linux Events
Linux User Groups
Link to Us
Security Center
Book Reviews
Security Dictionary
Security Tips
White Papers
Featured Blogs
All About Linux
DanWalsh LiveJournal
Latest Newsletters
Linux Advisory Watch: March 27th, 2015
Linux Security Week: March 23rd, 2015
LinuxSecurity Newsletters
Choose Lists:
About our Newsletters
RSS Feeds
Get the LinuxSecurity news you want faster with RSS
Powered By

Mandrake: sendmail dns map vulnerability Print E-mail
User Rating:      How can I rate this item?
Posted by Team   
Mandrake Due to wrong initialization of RESOURCE_RECORD_T structures, if sendmail receives a bad DNS reply it will call free() on random addresses which usually causes sendmail to crash.


                Mandrake Linux Security Update Advisory

Package name:           sendmail
Advisory ID:            MDKSA-2003:086
Date:                   August 26th, 2003

Affected versions:	8.2, 9.0, Corporate Server 2.1

Problem Description:

 A vulnerability was discovered in all 8.12.x versions of sendmail up to
 and including 8.12.8.  Due to wrong initialization of RESOURCE_RECORD_T
 structures, if sendmail receives a bad DNS reply it will call free() on
 random addresses which usually causes sendmail to crash.
 These updated packages are patched to fix the problem.


Updated Packages:
 Corporate Server 2.1:
 06f312efc82a853bef8f244f0a7d62b6  corporate/2.1/RPMS/sendmail-8.12.6-3.4mdk.i586.rpm
 6159dd74781b4e12ba2d9cb8c74cebc5  corporate/2.1/RPMS/sendmail-cf-8.12.6-3.4mdk.i586.rpm
 0947b751f4934fe29f32eb02670640ee  corporate/2.1/RPMS/sendmail-devel-8.12.6-3.4mdk.i586.rpm
 9b768e4a330cc0cd6cdebd1470953247  corporate/2.1/RPMS/sendmail-doc-8.12.6-3.4mdk.i586.rpm
 8458487a8e2a69b3648896e342eb4c1a  corporate/2.1/SRPMS/sendmail-8.12.6-3.4mdk.src.rpm

 Corporate Server 2.1/x86_64:
 04d7ce56ad6b62339622ae6e030234ed  x86_64/corporate/2.1/RPMS/sendmail-8.12.6-3.4mdk.x86_64.rpm
 4b64a8056a3499e1d36ac1de72bc8c7e  x86_64/corporate/2.1/RPMS/sendmail-cf-8.12.6-3.4mdk.x86_64.rpm
 5e2ac30e590d3985c8de9ced5178d875  x86_64/corporate/2.1/RPMS/sendmail-devel-8.12.6-3.4mdk.x86_64.rpm
 aabddfe03a3a0fb88082c0311b318738  x86_64/corporate/2.1/RPMS/sendmail-doc-8.12.6-3.4mdk.x86_64.rpm
 8458487a8e2a69b3648896e342eb4c1a  x86_64/corporate/2.1/SRPMS/sendmail-8.12.6-3.4mdk.src.rpm

 Mandrake Linux 8.2:
 2039013cc832600fe00c8c16f04e167f  8.2/RPMS/sendmail-8.12.1-4.4mdk.i586.rpm
 a628b53c10b173ad6b56ec818411e4a8  8.2/RPMS/sendmail-cf-8.12.1-4.4mdk.i586.rpm
 41b1161434cab61b55bbda169949a980  8.2/RPMS/sendmail-devel-8.12.1-4.4mdk.i586.rpm
 d7d9e039cb3265ad955ce1401d97ca98  8.2/RPMS/sendmail-doc-8.12.1-4.4mdk.i586.rpm
 7340654c00efcb2d64149cc946e1ea3b  8.2/SRPMS/sendmail-8.12.1-4.4mdk.src.rpm

 Mandrake Linux 8.2/PPC:
 552617df801abbb743ea19f08efe9cd5  ppc/8.2/RPMS/sendmail-8.12.1-4.4mdk.ppc.rpm
 634cf389d9b6d3782d52d6b4a9a06862  ppc/8.2/RPMS/sendmail-cf-8.12.1-4.4mdk.ppc.rpm
 4e5fdd49f36c8263f9f8d4a5405beb27  ppc/8.2/RPMS/sendmail-devel-8.12.1-4.4mdk.ppc.rpm
 320c1c788abf30b8fbafc6b6fff8ad6f  ppc/8.2/RPMS/sendmail-doc-8.12.1-4.4mdk.ppc.rpm
 7340654c00efcb2d64149cc946e1ea3b  ppc/8.2/SRPMS/sendmail-8.12.1-4.4mdk.src.rpm

 Mandrake Linux 9.0:
 06f312efc82a853bef8f244f0a7d62b6  9.0/RPMS/sendmail-8.12.6-3.4mdk.i586.rpm
 6159dd74781b4e12ba2d9cb8c74cebc5  9.0/RPMS/sendmail-cf-8.12.6-3.4mdk.i586.rpm
 0947b751f4934fe29f32eb02670640ee  9.0/RPMS/sendmail-devel-8.12.6-3.4mdk.i586.rpm
 9b768e4a330cc0cd6cdebd1470953247  9.0/RPMS/sendmail-doc-8.12.6-3.4mdk.i586.rpm
 8458487a8e2a69b3648896e342eb4c1a  9.0/SRPMS/sendmail-8.12.6-3.4mdk.src.rpm

Bug IDs fixed (see for more information):

To upgrade automatically, use MandrakeUpdate or urpmi.  The verification
of md5 checksums and GPG signatures is performed automatically for you.

A list of FTP mirrors can be obtained from:

All packages are signed by MandrakeSoft for security.  You can obtain
the GPG public key of the Mandrake Linux Security Team by executing:

  gpg --recv-keys --keyserver 0x22458A98

Please be aware that sometimes it takes the mirrors a few hours to

You can view other update advisories for Mandrake Linux at:

MandrakeSoft has several security-related mailing list services that
anyone can subscribe to.  Information on these lists can be obtained by

If you want to report vulnerabilities, please contact

Type Bits/KeyID     Date       User ID
pub  1024D/22458A98 2000-07-10 Linux Mandrake Security Team

< Prev   Next >


Latest Features
Peter Smith Releases Linux Network Security Online
Securing a Linux Web Server
Password guessing with Medusa 2.0
Password guessing as an attack vector
Squid and Digest Authentication
Squid and Basic Authentication
Demystifying the Chinese Hacking Industry: Earning 6 Million a Night
Free Online security course (LearnSIA) - A Call for Help
What You Need to Know About Linux Rootkits
Review: A Practical Guide to Fedora and Red Hat Enterprise Linux - Fifth Edition
Yesterday's Edition
Partner Sponsor

Community | HOWTOs | Blogs | Features | Book Reviews | Networking
 Security Projects |  Latest News |  Newsletters |  SELinux |  Privacy |  Home
 Hardening |   About Us |   Advertise |   Legal Notice |   RSS |   Guardian Digital
(c)Copyright 2015 Guardian Digital, Inc. All rights reserved.