Family: Debian Local Security Checks --> Category: infos
[DSA278] DSA-278-1 sendmail Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Michal Zalewski discovered a buffer overflow, triggered by a char to
int conversion, in the address parsing code in sendmail, a widely used
powerful, efficient, and scalable mail transport agent. This problem
is potentially remotely exploitable.
For the stable distribution (woody) this problem has been
fixed in version 8.12.3-6.3.
For the old stable distribution (potato) this problem has been
fixed in version 8.9.3-26.
For the unstable distribution (sid) this problem has been
fixed in version 8.12.9-1.
We recommend that you upgrade your sendmail packages.
Solution : http://www.debian.org/security/2003/dsa-278
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.