Family: Debian Local Security Checks --> Category: infos
[DSA384] DSA-384-1 sendmail Vulnerability Scan
Vulnerability Scan Summary
Detailed Explanation for this Vulnerability Test
Two vulnerabilities were reported in sendmail.
A "potential buffer overflow in ruleset parsing" for Sendmail
8.12.9, when using the nonstandard rulesets (1) recipient (2),
final, or (3) mailer-specific envelope recipients, has unknown
The prescan function in Sendmail 8.12.9 allows remote attackers to
execute arbitrary code via buffer overflow attacks, as demonstrated
using the parseaddr function in parseaddr.c.
For the stable distribution (woody) these problems have been fixed in
sendmail version 8.12.3-6.6 and sendmail-wide version
For the unstable distribution (sid) these problems have been fixed in
sendmail version 8.12.10-1.
We recommend that you update your sendmail package.
Solution : http://www.debian.org/security/2003/dsa-384
Threat Level: High
Click HERE for more information and discussions on this network vulnerability scan.