rhsa-2003_074
Vulnerability from csaf_redhat
Published
2003-03-03 17:05
Modified
2024-11-21 22:40
Summary
Red Hat Security Advisory: sendmail security update
Notes
Topic
Updated Sendmail packages are available to fix a vulnerability that
may allow remote attackers to gain root privileges by sending a
carefully crafted message.
[Updated March 18 2003]
Added packages for Red Hat Enterprise Linux ES and Red Hat Enterprise Linux WS.
Details
Sendmail is a widely used Mail Transport Agent (MTA) which is included
in all Red Hat Enterprise Linux distributions.
During a code audit of Sendmail by ISS, a critical vulnerability was
uncovered that affects unpatched versions of Sendmail prior to version
8.12.8. A remote attacker can send a carefully crafted email message
which, when processed by sendmail, causes arbitrary code to be
executed as root.
We are advised that a proof-of-concept exploit is known to exist, but
is not believed to be in the wild.
Since this is a message-based vulnerability, MTAs other than Sendmail
may pass on the carefully crafted message. This means that unpatched
versions of Sendmail inside a network could still be at risk even if
they do not accept external connections directly.
All users are advised to update to these erratum packages which contain
a backported patch to correct this vulnerability.
Red Hat would like to thank Eric Allman for his assistance with this
vulnerability.
Terms of Use
This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.
{ "document": { "aggregate_severity": { "namespace": "https://access.redhat.com/security/updates/classification/", "text": "Critical" }, "category": "csaf_security_advisory", "csaf_version": "2.0", "distribution": { "text": "Copyright \u00a9 Red Hat, Inc. All rights reserved.", "tlp": { "label": "WHITE", "url": "https://www.first.org/tlp/" } }, "lang": "en", "notes": [ { "category": "summary", "text": "Updated Sendmail packages are available to fix a vulnerability that\nmay allow remote attackers to gain root privileges by sending a\ncarefully crafted message.\n\n[Updated March 18 2003]\nAdded packages for Red Hat Enterprise Linux ES and Red Hat Enterprise Linux WS.", "title": "Topic" }, { "category": "general", "text": "Sendmail is a widely used Mail Transport Agent (MTA) which is included\nin all Red Hat Enterprise Linux distributions.\n\nDuring a code audit of Sendmail by ISS, a critical vulnerability was\nuncovered that affects unpatched versions of Sendmail prior to version\n8.12.8. A remote attacker can send a carefully crafted email message\nwhich, when processed by sendmail, causes arbitrary code to be\nexecuted as root.\n\nWe are advised that a proof-of-concept exploit is known to exist, but\nis not believed to be in the wild.\n\nSince this is a message-based vulnerability, MTAs other than Sendmail\nmay pass on the carefully crafted message. This means that unpatched\nversions of Sendmail inside a network could still be at risk even if\nthey do not accept external connections directly.\n\nAll users are advised to update to these erratum packages which contain\na backported patch to correct this vulnerability.\n\nRed Hat would like to thank Eric Allman for his assistance with this\nvulnerability.", "title": "Details" }, { "category": "legal_disclaimer", "text": "This content is licensed under the Creative Commons Attribution 4.0 International License (https://creativecommons.org/licenses/by/4.0/). If you distribute this content, or a modified version of it, you must provide attribution to Red Hat Inc. and provide a link to the original.", "title": "Terms of Use" } ], "publisher": { "category": "vendor", "contact_details": "https://access.redhat.com/security/team/contact/", "issuing_authority": "Red Hat Product Security is responsible for vulnerability handling across all Red Hat products and services.", "name": "Red Hat Product Security", "namespace": "https://www.redhat.com" }, "references": [ { "category": "self", "summary": "https://access.redhat.com/errata/RHSA-2003:074", "url": "https://access.redhat.com/errata/RHSA-2003:074" }, { "category": "external", "summary": "https://access.redhat.com/security/updates/classification/#critical", "url": "https://access.redhat.com/security/updates/classification/#critical" }, { "category": "external", "summary": "http://www.cert.org/advisories/CA-2003-07.html", "url": "http://www.cert.org/advisories/CA-2003-07.html" }, { "category": "self", "summary": "Canonical URL", "url": "https://security.access.redhat.com/data/csaf/v2/advisories/2003/rhsa-2003_074.json" } ], "title": "Red Hat Security Advisory: sendmail security update", "tracking": { "current_release_date": "2024-11-21T22:40:30+00:00", "generator": { "date": "2024-11-21T22:40:30+00:00", "engine": { "name": "Red Hat SDEngine", "version": "4.2.1" } }, "id": "RHSA-2003:074", "initial_release_date": "2003-03-03T17:05:00+00:00", "revision_history": [ { "date": "2003-03-03T17:05:00+00:00", "number": "1", "summary": "Initial version" }, { "date": "2003-03-12T00:00:00+00:00", "number": "2", "summary": "Last updated version" }, { "date": "2024-11-21T22:40:30+00:00", "number": "3", "summary": "Last generated version" } ], "status": "final", "version": "3" } }, "product_tree": { "branches": [ { "branches": [ { "branches": [ { "category": "product_name", "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product": { "name": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_id": "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::as" } } }, { "category": "product_name", "name": "Red Hat Linux Advanced Workstation 2.1", "product": { "name": "Red Hat Linux Advanced Workstation 2.1", "product_id": "Red Hat Linux Advanced Workstation 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::aw" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux ES version 2.1", "product": { "name": "Red Hat Enterprise Linux ES version 2.1", "product_id": "Red Hat Enterprise Linux ES version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::es" } } }, { "category": "product_name", "name": "Red Hat Enterprise Linux WS version 2.1", "product": { "name": "Red Hat Enterprise Linux WS version 2.1", "product_id": "Red Hat Enterprise Linux WS version 2.1", "product_identification_helper": { "cpe": "cpe:/o:redhat:enterprise_linux:2.1::ws" } } } ], "category": "product_family", "name": "Red Hat Enterprise Linux" } ], "category": "vendor", "name": "Red Hat" } ] }, "vulnerabilities": [ { "cve": "CVE-2002-1337", "ids": [ { "system_name": "Red Hat Bugzilla ID", "text": "1616877" } ], "notes": [ { "category": "description", "text": "Buffer overflow in Sendmail 5.79 to 8.12.7 allows remote attackers to execute arbitrary code via certain formatted address fields, related to sender and recipient header comments as processed by the crackaddr function of headers.c.", "title": "Vulnerability description" }, { "category": "summary", "text": "security flaw", "title": "Vulnerability summary" } ], "product_status": { "fixed": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ] }, "references": [ { "category": "self", "summary": "Canonical URL", "url": "https://access.redhat.com/security/cve/CVE-2002-1337" }, { "category": "external", "summary": "RHBZ#1616877", "url": "https://bugzilla.redhat.com/show_bug.cgi?id=1616877" }, { "category": "external", "summary": "https://www.cve.org/CVERecord?id=CVE-2002-1337", "url": "https://www.cve.org/CVERecord?id=CVE-2002-1337" }, { "category": "external", "summary": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337", "url": "https://nvd.nist.gov/vuln/detail/CVE-2002-1337" } ], "release_date": "2003-03-03T00:00:00+00:00", "remediations": [ { "category": "vendor_fix", "date": "2003-03-03T17:05:00+00:00", "details": "Before applying this update, make sure all previously released errata\nrelevant to your system have been applied.\n\nTo update all RPMs for your particular architecture, run:\n\nrpm -Fvh [filenames]\n\nwhere [filenames] is a list of the RPMs you wish to upgrade. Only those\nRPMs which are currently installed will be updated. Those RPMs which are\nnot installed but included in the list will not be updated. Note that you\ncan also use wildcards (*.rpm) if your current directory *only* contains the\ndesired RPMs.\n\nPlease note that this update is also available via Red Hat Network. Many\npeople find this an easier way to apply updates. To use Red Hat Network,\nlaunch the Red Hat Update Agent with the following command:\n\nup2date\n\nThis will start an interactive process that will result in the appropriate\nRPMs being upgraded on your system.", "product_ids": [ "Red Hat Enterprise Linux AS (Advanced Server) version 2.1 ", "Red Hat Enterprise Linux ES version 2.1", "Red Hat Enterprise Linux WS version 2.1", "Red Hat Linux Advanced Workstation 2.1" ], "restart_required": { "category": "none" }, "url": "https://access.redhat.com/errata/RHSA-2003:074" } ], "threats": [ { "category": "impact", "details": "Critical" } ], "title": "security flaw" } ] }
Loading…
Loading…
Sightings
Author | Source | Type | Date |
---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.