[ale] [Fwd: buffer overflow in sendmail]
Jonathan Glass
jonathan.glass at ibb.gatech.edu
Wed Sep 17 15:45:09 EDT 2003
Yet another patch!
Jonathan Glass
---------------------------- Original Message ----------------------------
Subject: buffer overflow in sendmail
From: "Todd C. Miller" <Todd.Miller at courtesan.com>
Date: Wed, September 17, 2003 2:04 pm
To: security-announce at openbsd.org
--------------------------------------------------------------------------
A buffer overflow in sendmail's address parsing routines has been
found by Michal Zalewski. The bug appears to be remotely exploitable on
Linux and while it will be more difficult to exploit on OpenBSD it still
looks to be possible.
The bug has been fixed in OpenBSD-current, OpenBSD 3.4 as well as
the 3.2 and 3.3 -stable branches. Additionally, the current 3.4
snapshots also contain the fix. Patches are now available for
OpenBSD 3.2 and 3.3
Patch for OpenBSD 3.2:
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/018_sendmail.patch
Patch for OpenBSD 3.3:
ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.3/common/005_sendmail.patch
Note that this is the second revision of the patch that includes
an unrelated (and less critical) fix from Sendmail 8.12.10. That
fix is not included in OpenBSD 3.4 or the 3.4 snapshots as it
can only be triggered by non-standard rulesets.
For more information, please see Michal's advisory:
http://www.securityfocus.com/archive/1/337839/2003-09-14/2003-09-20/0
The release notes for Sendmail 8.12.10 also include related information:
http://www.sendmail.org/8.12.10.html
--
Jonathan Glass
Systems Support Specialist II
IBB/GTEC
Office: 404-385-0127
Cell: 404-444-4086
More information about the Ale
mailing list