Family: Debian Local Security Checks --> Category: infos
[DSA290] DSA-290-1 sendmail-wide Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Michal Zalewski discovered a buffer overflow, triggered by a char to
int conversion, in the address parsing code in sendmail, a widely used
powerful, efficient, and scalable mail transport agent. This problem
is potentially remotely exploitable.
For the stable distribution (woody) this problem has been fixed in
For the old stable distribution (potato) this problem has been
fixed in version 8.9.3+3.2W-25
For the unstable distribution (sid) this problem has been
fixed in version 8.12.9+3.5Wbeta-1
We recommend that you upgrade your sendmail-wide packages.
Solution : http://www.debian.org/security/2003/dsa-290
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.