Mandrake Linux Security Advisory : sendmail (MDKSA-2003:086)
2004-07-31T00:00:00
ID MANDRAKE_MDKSA-2003-086.NASL Type nessus Reporter This script is Copyright (C) 2004-2021 Tenable Network Security, Inc. Modified 2004-07-31T00:00:00
Description
A vulnerability was discovered in all 8.12.x versions of sendmail up
to and including 8.12.8. Due to wrong initialization of
RESOURCE_RECORD_T structures, if sendmail receives a bad DNS reply it
will call free() on random addresses which usually causes sendmail to
crash.
These updated packages are patched to fix the problem.
#%NASL_MIN_LEVEL 70300
#
# (C) Tenable Network Security, Inc.
#
# The descriptive text and package checks in this plugin were
# extracted from Mandrake Linux Security Advisory MDKSA-2003:086.
# The text itself is copyright (C) Mandriva S.A.
#
include('deprecated_nasl_level.inc');
include('compat.inc');
if (description)
{
script_id(14068);
script_version("1.18");
script_set_attribute(attribute:"plugin_modification_date", value:"2021/01/06");
script_cve_id("CVE-2003-0688");
script_xref(name:"MDKSA", value:"2003:086");
script_name(english:"Mandrake Linux Security Advisory : sendmail (MDKSA-2003:086)");
script_summary(english:"Checks rpm output for the updated packages");
script_set_attribute(
attribute:"synopsis",
value:
"The remote Mandrake Linux host is missing one or more security
updates."
);
script_set_attribute(
attribute:"description",
value:
"A vulnerability was discovered in all 8.12.x versions of sendmail up
to and including 8.12.8. Due to wrong initialization of
RESOURCE_RECORD_T structures, if sendmail receives a bad DNS reply it
will call free() on random addresses which usually causes sendmail to
crash.
These updated packages are patched to fix the problem."
);
script_set_attribute(
attribute:"see_also",
value:"http://www.sendmail.org/dnsmap1.html"
);
script_set_attribute(
attribute:"see_also",
value:"https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=54367"
);
script_set_attribute(attribute:"solution", value:"Update the affected packages.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P");
script_set_attribute(attribute:"plugin_type", value:"local");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:sendmail");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:sendmail-cf");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:sendmail-devel");
script_set_attribute(attribute:"cpe", value:"p-cpe:/a:mandriva:linux:sendmail-doc");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:8.2");
script_set_attribute(attribute:"cpe", value:"cpe:/o:mandrakesoft:mandrake_linux:9.0");
script_set_attribute(attribute:"patch_publication_date", value:"2003/08/26");
script_set_attribute(attribute:"plugin_publication_date", value:"2004/07/31");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_copyright(english:"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.");
script_family(english:"Mandriva Local Security Checks");
script_dependencies("ssh_get_info.nasl");
script_require_keys("Host/local_checks_enabled", "Host/cpu", "Host/Mandrake/release", "Host/Mandrake/rpm-list");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("rpm.inc");
if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
if (!get_kb_item("Host/Mandrake/release")) audit(AUDIT_OS_NOT, "Mandriva / Mandake Linux");
if (!get_kb_item("Host/Mandrake/rpm-list")) audit(AUDIT_PACKAGE_LIST_MISSING);
cpu = get_kb_item("Host/cpu");
if (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);
if (cpu !~ "^(amd64|i[3-6]86|x86_64)$") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, "Mandriva / Mandrake Linux", cpu);
flag = 0;
if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"sendmail-8.12.1-4.4mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"sendmail-cf-8.12.1-4.4mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"sendmail-devel-8.12.1-4.4mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK8.2", cpu:"i386", reference:"sendmail-doc-8.12.1-4.4mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"sendmail-8.12.6-3.4mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"sendmail-cf-8.12.6-3.4mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"sendmail-devel-8.12.6-3.4mdk", yank:"mdk")) flag++;
if (rpm_check(release:"MDK9.0", cpu:"i386", reference:"sendmail-doc-8.12.6-3.4mdk", yank:"mdk")) flag++;
if (flag)
{
if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());
else security_warning(0);
exit(0);
}
else audit(AUDIT_HOST_NOT, "affected");
{"id": "MANDRAKE_MDKSA-2003-086.NASL", "bulletinFamily": "scanner", "title": "Mandrake Linux Security Advisory : sendmail (MDKSA-2003:086)", "description": "A vulnerability was discovered in all 8.12.x versions of sendmail up\nto and including 8.12.8. Due to wrong initialization of\nRESOURCE_RECORD_T structures, if sendmail receives a bad DNS reply it\nwill call free() on random addresses which usually causes sendmail to\ncrash.\n\nThese updated packages are patched to fix the problem.", "published": "2004-07-31T00:00:00", "modified": "2004-07-31T00:00:00", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "href": "https://www.tenable.com/plugins/nessus/14068", "reporter": "This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.", "references": ["https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=54367", "http://www.sendmail.org/dnsmap1.html"], "cvelist": ["CVE-2003-0688"], "type": "nessus", "lastseen": "2021-01-07T11:51:19", "edition": 24, "viewCount": 0, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2003-0688"]}, {"type": "osvdb", "idList": ["OSVDB:6480"]}, {"type": "cert", "idList": ["VU:993452"]}, {"type": "suse", "idList": ["SUSE-SA:2003:035"]}, {"type": "securityvulns", "idList": ["SECURITYVULNS:DOC:5025"]}, {"type": "nessus", "idList": ["SUSE_SA_2003_035.NASL"]}], "modified": "2021-01-07T11:51:19", "rev": 2}, "score": {"value": 4.6, "vector": "NONE", "modified": "2021-01-07T11:51:19", "rev": 2}, "vulnersScore": 4.6}, "sourceData": "#%NASL_MIN_LEVEL 70300\n\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Mandrake Linux Security Advisory MDKSA-2003:086. \n# The text itself is copyright (C) Mandriva S.A.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(14068);\n script_version(\"1.18\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/06\");\n\n script_cve_id(\"CVE-2003-0688\");\n script_xref(name:\"MDKSA\", value:\"2003:086\");\n\n script_name(english:\"Mandrake Linux Security Advisory : sendmail (MDKSA-2003:086)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote Mandrake Linux host is missing one or more security\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A vulnerability was discovered in all 8.12.x versions of sendmail up\nto and including 8.12.8. Due to wrong initialization of\nRESOURCE_RECORD_T structures, if sendmail receives a bad DNS reply it\nwill call free() on random addresses which usually causes sendmail to\ncrash.\n\nThese updated packages are patched to fix the problem.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.sendmail.org/dnsmap1.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bugs.freebsd.org/bugzilla/show_bug.cgi?id=54367\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:sendmail\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:sendmail-cf\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:sendmail-devel\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:mandriva:linux:sendmail-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandrakesoft:mandrake_linux:8.2\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:mandrakesoft:mandrake_linux:9.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2003/08/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2004/07/31\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2004-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Mandriva Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/cpu\", \"Host/Mandrake/release\", \"Host/Mandrake/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Mandrake/release\")) audit(AUDIT_OS_NOT, \"Mandriva / Mandake Linux\");\nif (!get_kb_item(\"Host/Mandrake/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (cpu !~ \"^(amd64|i[3-6]86|x86_64)$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Mandriva / Mandrake Linux\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"MDK8.2\", cpu:\"i386\", reference:\"sendmail-8.12.1-4.4mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK8.2\", cpu:\"i386\", reference:\"sendmail-cf-8.12.1-4.4mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK8.2\", cpu:\"i386\", reference:\"sendmail-devel-8.12.1-4.4mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK8.2\", cpu:\"i386\", reference:\"sendmail-doc-8.12.1-4.4mdk\", yank:\"mdk\")) flag++;\n\nif (rpm_check(release:\"MDK9.0\", cpu:\"i386\", reference:\"sendmail-8.12.6-3.4mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK9.0\", cpu:\"i386\", reference:\"sendmail-cf-8.12.6-3.4mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK9.0\", cpu:\"i386\", reference:\"sendmail-devel-8.12.6-3.4mdk\", yank:\"mdk\")) flag++;\nif (rpm_check(release:\"MDK9.0\", cpu:\"i386\", reference:\"sendmail-doc-8.12.6-3.4mdk\", yank:\"mdk\")) flag++;\n\n\nif (flag)\n{\n if (report_verbosity > 0) security_warning(port:0, extra:rpm_report_get());\n else security_warning(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "naslFamily": "Mandriva Local Security Checks", "pluginID": "14068", "cpe": ["cpe:/o:mandrakesoft:mandrake_linux:8.2", "p-cpe:/a:mandriva:linux:sendmail-cf", "cpe:/o:mandrakesoft:mandrake_linux:9.0", "p-cpe:/a:mandriva:linux:sendmail-devel", "p-cpe:/a:mandriva:linux:sendmail-doc", "p-cpe:/a:mandriva:linux:sendmail"], "scheme": null}
{"cve": [{"lastseen": "2020-10-03T11:33:02", "description": "The DNS map code in Sendmail 8.12.8 and earlier, when using the \"enhdnsbl\" feature, does not properly initialize certain data structures, which allows remote attackers to cause a denial of service (process crash) via an invalid DNS response that causes Sendmail to free incorrect data.", "edition": 3, "cvss3": {}, "published": "2003-10-20T04:00:00", "title": "CVE-2003-0688", "type": "cve", "cwe": ["NVD-CWE-Other"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "PARTIAL", "integrityImpact": "NONE", "baseScore": 5.0, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:P", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2003-0688"], "modified": "2018-05-03T01:29:00", "cpe": ["cpe:/a:redhat:sendmail:8.12.5-7", "cpe:/a:sendmail:sendmail:8.12.3", "cpe:/a:sendmail:sendmail:8.12.8", "cpe:/a:sendmail:sendmail:8.12.5", "cpe:/a:sendmail:sendmail:8.12.4", "cpe:/a:sendmail:sendmail:8.12.1", "cpe:/o:freebsd:freebsd:4.7", "cpe:/o:freebsd:freebsd:5.0", "cpe:/a:sendmail:sendmail:8.12.6", "cpe:/a:sendmail:sendmail:8.12.2", "cpe:/o:freebsd:freebsd:4.6", "cpe:/o:compaq:tru64:5.0a", "cpe:/o:freebsd:freebsd:4.8", "cpe:/o:sgi:irix:6.5.20", "cpe:/a:redhat:sendmail:8.12.8-4", "cpe:/o:sgi:irix:6.5.21", "cpe:/o:compaq:tru64:5.1", "cpe:/o:openbsd:openbsd:3.2", "cpe:/o:sgi:irix:6.5.19", "cpe:/a:sendmail:sendmail:8.12.7"], "id": "CVE-2003-0688", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2003-0688", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}, "cpe23": ["cpe:2.3:o:compaq:tru64:5.0a:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:5.0:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.8:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.12.7:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.12.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:sendmail:8.12.5-7:*:i386_cf:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.12.4:*:*:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.7:*:*:*:*:*:*:*", "cpe:2.3:o:openbsd:openbsd:3.2:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.19:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.21:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:sendmail:8.12.8-4:*:i386_cf:*:*:*:*:*", "cpe:2.3:o:compaq:tru64:5.1:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.12.5:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:sendmail:8.12.8-4:*:i386_doc:*:*:*:*:*", "cpe:2.3:a:redhat:sendmail:8.12.5-7:*:i386_dev:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.12.8:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.12.3:*:*:*:*:*:*:*", "cpe:2.3:o:sgi:irix:6.5.20:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.12.2:*:*:*:*:*:*:*", "cpe:2.3:a:sendmail:sendmail:8.12.1:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:sendmail:8.12.8-4:*:i386:*:*:*:*:*", "cpe:2.3:a:redhat:sendmail:8.12.5-7:*:i386:*:*:*:*:*", "cpe:2.3:a:redhat:sendmail:8.12.8-4:*:i386_dev:*:*:*:*:*", "cpe:2.3:o:freebsd:freebsd:4.6:*:*:*:*:*:*:*", "cpe:2.3:a:redhat:sendmail:8.12.5-7:*:i386_doc:*:*:*:*:*"]}], "osvdb": [{"lastseen": "2017-04-28T13:20:01", "bulletinFamily": "software", "cvelist": ["CVE-2003-0688"], "edition": 1, "description": "# No description provided by the source\n\n## References:\n[Vendor Specific Advisory URL](http://www.sendmail.org/dnsmap1.html)\n[Secunia Advisory ID:9602](https://secuniaresearch.flexerasoftware.com/advisories/9602/)\nOVAL ID: 597\n[CVE-2003-0688](https://vulners.com/cve/CVE-2003-0688)\nCERT VU: 993452\n", "modified": "2003-03-29T00:00:00", "published": "2003-03-29T00:00:00", "href": "https://vulners.com/osvdb/OSVDB:6480", "id": "OSVDB:6480", "type": "osvdb", "title": "Sendmail DNS Map Code Remote DoS", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "cert": [{"lastseen": "2020-09-18T20:44:07", "bulletinFamily": "info", "cvelist": ["CVE-2003-0688"], "description": "### Overview \n\nThere is an uninitialized data structure in sendmail 8.12.(x < 9) servers configured to use DNS maps. An attacker able to send crafted DNS responses to affected sendmail servers may be able crash the sendmail daemon, or potentially execute arbitrary code.\n\n### Description \n\nDNS maps are used in sendmail to provide a capability to dynamically look up information about a host before accepting mail from it. For example, a DNS request can be made to some site-specific authoritative source to determine whether the source of some message has previously been identified as a spam relay.\n\nA failure to initialize RESOURCE_RECORD_T data structures in sendmail's implementation of DNS maps may lead to portions of memory in the sendmail process being freed in error. The error is in the `dns_parse_reply() `function in `sm_resolve.c (`[`patched`](<http://www.sendmail.org/sm_resolve.c.p1>)`)`: \n \n`--- sm_resolve.c.orig Fri Jun 28 00:43:24 2002` \n`+++ sm_resolve.c Thu Jul 10 01:21:17 2003` \n`@@ -233,6 +233,7 @@` \n`\\t\\t\\tdns_free_data(r);` \n`\\t\\t\\treturn NULL;` \n`\\t\\t}` \n`+\\t\\tmemset(*rr, 0, sizeof(**rr));` \n`\\t\\t(*rr)->rr_domain = sm_strdup(host);` \n`\\t\\tif ((*rr)->rr_domain == NULL)` \n`\\t\\t{` \n \nA fix for this condition was made in sendmail 8.12.9 in March 2003, but it was not known to be a security issue at that time. \n \n--- \n \n### Impact \n\nA remote attacker may be able to cause `sendmail `to `_free(_`_)_ arbitrary chunks of memory. This could crash affected `sendmail` daemons, causing a denial of service. If an area of memory being freed is under the control of the intruder, remote execution of code with the privileges of the running daemon may be possible. \n \n--- \n \n### Solution \n\nApply patches as recommended by an appropriate vendor or upgrade to [sendmail 8.12.9](<http://www.sendmail.org/8.12.9.html>). \n \n--- \n \nIn addition, disabling features in sendmail that use DNS maps will also remove one necessary precondition needed to exploit this vulnerability (e.g., disable` FEATURE(`enhdnsbl')` == \"enhanced DNS-based blacklist lookups\") . \n \n--- \n \n### Vendor Information\n\n993452\n\nFilter by status: All Affected Not Affected Unknown\n\nFilter by content: __ Additional information available\n\n__ Sort by: Status Alphabetical\n\nExpand all\n\n**Javascript is disabled. Click here to view vendors.**\n\n### FreeBSD __ Affected\n\nUpdated: August 26, 2003 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nPlease see the vendor statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) at:\n\n<ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/advisories/FreeBSD-SA-03:11.sendmail.asc>\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nText of statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) follows: \n \n[Note: Section V.1 below should read as follows: \n \n`1) Upgrade your vulnerable system to 4-STABLE, 5.1-RELEASE, or to th``e \nRELENG_5_1, RELENG_4_8, or RELENG_4_7 security branch dated after the \ncorrection date (5.1-RELEASE-p2, 4.8-RELEASE-p4, or 4.7-RELEASE-p14, \nrespectively).`] \n \n`-----BEGIN PGP SIGNED MESSAGE----- \nHash: SHA1 \n` \n`============================================================================= \nFreeBSD-SA-03:11.sendmail Security Advisory` \n`The FreeBSD Project \n` \n`Topic: sendmail DNS map problem \n` \n`Category: contrib \nModule: contrib_sendmail \nAnnounced: 2003-08-26 \nCredits: Oleg Bulyzhin <oleg@rinet.ru> \nAffects: 4.6-RELEASE (up to -p16), 4.7-RELEASE (up to -p13),` \n`4.8-RELEASE (up to -p3), 5.0-RELEASE (up to -p11) \n4-STABLE prior to Mar 29 19:33:18 2003 UTC` \n`Corrected: 2003-08-25 22:33:14 UTC (RELENG_5_0) \n2003-08-25 22:35:23 UTC (RELENG_4_8) \n2003-08-25 22:36:10 UTC (RELENG_4_7) \n2003-08-25 22:38:53 UTC (RELENG_4_6)` \n`FreeBSD only: NO \n` \n`For general information regarding FreeBSD Security Advisories, \nincluding descriptions of the fields above, security branches, and the \nfollowing sections, please visit \n<URL:``<http://www.freebsd.org/security/>``>. \n` \n`I. Background \n` \n`FreeBSD includes sendmail(8), a general purpose internetwork mail \nrouting facility, as the default Mail Transfer Agent (MTA). \n` \n`II. Problem Description \n` \n`Some versions of sendmail (8.12.0 through 8.12.8) contain a \nprogramming error in the code that implements DNS maps. A malformed \nDNS reply packet may cause sendmail to call `free()' on an \nuninitialized pointer. \n` \n`NOTE: The default sendmail configuration in FreeBSD does not utilize \nDNS maps. \n` \n`III. Impact \n` \n`Calling `free()' on an uninitialized pointer may result in a sendmail \nchild process crashing. It may also be possible for an attacker to \nsomehow influence the value of the `uninitialized pointer' and cause \nan arbitrary memory trunk to be freed. This could further lead to \nsome other exploitable vulnerability, although no such cases are known \nat this time. \n` \n`IV. Workaround \n` \n`Do not use DNS maps. \n` \n`V. Solution \n` \n`Do one of the following: \n` \n`1) Upgrade your vulnerable system to 4-STABLE, 5.1-RELEASE, or to the \nRELENG_5_1, RELENG_4_8, or RELENG_4_7 security branch dated after the \ncorrection date (5.1-RELEASE-p11, 4.8-RELEASE-p4, or 4.7-RELEASE-p14, \nrespectively). \n` \n`2) To patch your present system: \n` \n`The following patch has been verified to apply to FreeBSD 5.0, 4.8, \n4.7, and 4.6 systems. \n` \n`a) Download the relevant patch from the location below, and verify the \ndetached PGP signature using your PGP utility. \n` \n`<ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:11/sendmail.patch>`` \n``<ftp://ftp.FreeBSD.org/pub/FreeBSD/CERT/patches/SA-03:11/sendmail.patch.asc>`` \n` \n`b) Execute the following commands as root: \n` \n`# cd /usr/src \n# patch < /path/to/patch \n# cd /usr/src/lib/libsm \n# make obj && make depend && make \n# cd /usr/src/lib/libsmutil \n# make obj && make depend && make \n# cd /usr/src/usr.sbin/sendmail \n# make obj && make depend && make && make install \n` \n`c) Restart sendmail. Execute the following command as root. \n` \n`# /bin/sh /etc/rc.sendmail restart \n` \n`VI. Correction details \n` \n`The following list contains the revision numbers of each file that was \ncorrected in FreeBSD. \n` \n`Path Revision \nBranch` \n`- ------------------------------------------------------------------------- \nsrc/UPDATING` \n`RELENG_5_0 1.229.2.17 \nRELENG_4_8 1.73.2.80.2.6 \nRELENG_4_7 1.73.2.74.2.17 \nRELENG_4_6 1.73.2.68.2.45` \n`src/sys/conf/newvers.sh \nRELENG_5_0 1.48.2.12 \nRELENG_4_8 1.44.2.29.2.5 \nRELENG_4_7 1.44.2.26.2.16 \nRELENG_4_6 1.44.2.23.2.34` \n`src/contrib/sendmail/src/sm_resolve.c \nRELENG_5_0 1.1.1.4.2.1 \nRELENG_4_8 1.1.1.1.2.2.4.1 \nRELENG_4_7 1.1.1.1.2.2.2.1 \nRELENG_4_6 1.1.1.1.2.1.2.2` \n`- ------------------------------------------------------------------------- \n` \n`VII. References \n` \n`<URL:``<http://www.sendmail.org/dnsmap1.html>``> \n<URL:``<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0688>``> \n-----BEGIN PGP SIGNATURE----- \nVersion: GnuPG v1.2.2 (FreeBSD) \n` \n`iD8DBQE/S4xUFdaIBMps37IRAoJ4AJ9AiL4AMlSXz/thD2SuNkKSQsUZHgCeKbds \nqEb9Em5ElZZOEnIajwneKIg= \n=SjNG \n-----END PGP SIGNATURE----- \n_______________________________________________ \nfreebsd-security-notifications@freebsd.org mailing list \n``<http://lists.freebsd.org/mailman/listinfo/freebsd-security-notifications>`` \nTo unsubscribe, send any mail to \"freebsd-security-notifications-unsubscribe@freebsd.org\"`\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23993452 Feedback>).\n\n### MandrakeSoft __ Affected\n\nUpdated: August 26, 2003 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nPlease see the vendor statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) at:\n\n<http://www.mandrakesecure.net/en/advisories/advisory.php?name=MDKSA-2003:086>\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nText of statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) follows: \n`-----BEGIN PGP SIGNED MESSAGE----- \nHash: SHA1 \n` \n`________________________________________________________________________ \n` \n`Mandrake Linux Security Update Advisory \n________________________________________________________________________ \n` \n`Package name: sendmail \nAdvisory ID: MDKSA-2003:086 \nDate: August 26th, 2003 \n` \n`Affected versions:8.2, 9.0, Corporate Server 2.1 \n________________________________________________________________________ \n` \n`Problem Description: \n` \n`A vulnerability was discovered in all 8.12.x versions of sendmail up to \nand including 8.12.8. Due to wrong initialization of RESOURCE_RECORD_T \nstructures, if sendmail receives a bad DNS reply it will call free() on \nrandom addresses which usually causes sendmail to crash.` \n \n`These updated packages are patched to fix the problem. \n________________________________________________________________________ \n` \n`References: \n` \n`<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0688>`` \n``<http://www.sendmail.org/dnsmap1.html>`` \n``<http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/54367>` \n`________________________________________________________________________ \n` \n`Updated Packages: \n` \n`Corporate Server 2.1: \n06f312efc82a853bef8f244f0a7d62b6 corporate/2.1/RPMS/sendmail-8.12.6-3.4mdk.i586.rpm \n6159dd74781b4e12ba2d9cb8c74cebc5 corporate/2.1/RPMS/sendmail-cf-8.12.6-3.4mdk.i586.rpm \n0947b751f4934fe29f32eb02670640ee corporate/2.1/RPMS/sendmail-devel-8.12.6-3.4mdk.i586.rpm \n9b768e4a330cc0cd6cdebd1470953247 corporate/2.1/RPMS/sendmail-doc-8.12.6-3.4mdk.i586.rpm \n8458487a8e2a69b3648896e342eb4c1a corporate/2.1/SRPMS/sendmail-8.12.6-3.4mdk.src.rpm` \n \n`Corporate Server 2.1/x86_64: \n04d7ce56ad6b62339622ae6e030234ed x86_64/corporate/2.1/RPMS/sendmail-8.12.6-3.4mdk.x86_64.rpm \n4b64a8056a3499e1d36ac1de72bc8c7e x86_64/corporate/2.1/RPMS/sendmail-cf-8.12.6-3.4mdk.x86_64.rpm \n5e2ac30e590d3985c8de9ced5178d875 x86_64/corporate/2.1/RPMS/sendmail-devel-8.12.6-3.4mdk.x86_64.rpm \naabddfe03a3a0fb88082c0311b318738 x86_64/corporate/2.1/RPMS/sendmail-doc-8.12.6-3.4mdk.x86_64.rpm \n8458487a8e2a69b3648896e342eb4c1a x86_64/corporate/2.1/SRPMS/sendmail-8.12.6-3.4mdk.src.rpm` \n \n`Mandrake Linux 8.2: \n2039013cc832600fe00c8c16f04e167f 8.2/RPMS/sendmail-8.12.1-4.4mdk.i586.rpm \na628b53c10b173ad6b56ec818411e4a8 8.2/RPMS/sendmail-cf-8.12.1-4.4mdk.i586.rpm \n41b1161434cab61b55bbda169949a980 8.2/RPMS/sendmail-devel-8.12.1-4.4mdk.i586.rpm \nd7d9e039cb3265ad955ce1401d97ca98 8.2/RPMS/sendmail-doc-8.12.1-4.4mdk.i586.rpm \n7340654c00efcb2d64149cc946e1ea3b 8.2/SRPMS/sendmail-8.12.1-4.4mdk.src.rpm` \n \n`Mandrake Linux 8.2/PPC: \n552617df801abbb743ea19f08efe9cd5 ppc/8.2/RPMS/sendmail-8.12.1-4.4mdk.ppc.rpm \n634cf389d9b6d3782d52d6b4a9a06862 ppc/8.2/RPMS/sendmail-cf-8.12.1-4.4mdk.ppc.rpm \n4e5fdd49f36c8263f9f8d4a5405beb27 ppc/8.2/RPMS/sendmail-devel-8.12.1-4.4mdk.ppc.rpm \n320c1c788abf30b8fbafc6b6fff8ad6f ppc/8.2/RPMS/sendmail-doc-8.12.1-4.4mdk.ppc.rpm \n7340654c00efcb2d64149cc946e1ea3b ppc/8.2/SRPMS/sendmail-8.12.1-4.4mdk.src.rpm` \n \n`Mandrake Linux 9.0: \n06f312efc82a853bef8f244f0a7d62b6 9.0/RPMS/sendmail-8.12.6-3.4mdk.i586.rpm \n6159dd74781b4e12ba2d9cb8c74cebc5 9.0/RPMS/sendmail-cf-8.12.6-3.4mdk.i586.rpm \n0947b751f4934fe29f32eb02670640ee 9.0/RPMS/sendmail-devel-8.12.6-3.4mdk.i586.rpm \n9b768e4a330cc0cd6cdebd1470953247 9.0/RPMS/sendmail-doc-8.12.6-3.4mdk.i586.rpm \n8458487a8e2a69b3648896e342eb4c1a 9.0/SRPMS/sendmail-8.12.6-3.4mdk.src.rpm` \n`________________________________________________________________________ \n` \n`Bug IDs fixed (see ``<https://qa.mandrakesoft.com>`` for more information): \n________________________________________________________________________ \n` \n`To upgrade automatically, use MandrakeUpdate or urpmi. The verification \nof md5 checksums and GPG signatures is performed automatically for you. \n` \n`A list of FTP mirrors can be obtained from: \n` \n`<http://www.mandrakesecure.net/en/ftp.php>`` \n` \n`All packages are signed by MandrakeSoft for security. You can obtain \nthe GPG public key of the Mandrake Linux Security Team by executing: \n` \n`gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98 \n` \n`Please be aware that sometimes it takes the mirrors a few hours to \nupdate. \n` \n`You can view other update advisories for Mandrake Linux at: \n` \n`<http://www.mandrakesecure.net/en/advisories/>`` \n` \n`MandrakeSoft has several security-related mailing list services that \nanyone can subscribe to. Information on these lists can be obtained by \nvisiting: \n` \n`<http://www.mandrakesecure.net/en/mlist.php>`` \n` \n`If you want to report vulnerabilities, please contact \n` \n`security_linux-mandrake.com \n` \n`Type Bits/KeyID Date User ID \npub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team` \n`<security linux-mandrake.com> \n-----BEGIN PGP SIGNATURE----- \nVersion: GnuPG v1.0.7 (GNU/Linux) \n` \n`iD8DBQE/SvSwmqjQ0CJFipgRAhRDAKCCv2FUoTaKeIqHsV5FABgCyOij3wCgl15/ \n7Yqza+R5v0QER5DtbbryHPQ= \n=NmAc \n-----END PGP SIGNATURE-----`\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23993452 Feedback>).\n\n### OpenBSD __ Affected\n\nUpdated: August 28, 2003 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nPlease see the vendor statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) at:\n\n<http://www.openbsd.org/errata32.html#sendmail3>\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nText of statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) follows: \nThere is a potential problem in the sendmail 8.12 series with respect \nto DNS maps in sendmail 8.12.8 and earlier sendmail 8.12.x versions. \nThe bug did not exist in versions before 8.12 as the DNS map type \nis new to 8.12. The bug was fixed in 8.12.9, released March 29, \n2003 but not labeled as a security fix as it wasn't believed to be \na security bug at the time. Note that only FEATURE(`enhdnsbl') \nuses a DNS map. We do not have an assessment whether this problem \nis exploitable but we want to inform you just in case you distribute \nsendmail 8.12.x versions before 8.12.9. \n \nOpenBSD 3.2 shipped with sendmail 8.12.8 and thus has the bug. \nOpenBSD 3.3 shipped with sendmail 8.12.9 and does *not* have the bug. \n \nThe problem has been fixed in the OpenBSD 3.2-stable branch. \nIn addition, a patch is available for OpenBSD 3.2: \n_<ftp://ftp.openbsd.org/pub/OpenBSD/patches/3.2/common/016_sendmail.patch>_ \n \nPlease note that this only affects sendmail configurations that use \nthe \"enhdnsbl\" feature. The default OpenBSD sendmail config does \n*not* use this. Unless you have created a custom config that uses \nenhdnsbl, you do not need to apply the patch or update sendmail.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23993452 Feedback>).\n\n### OpenPKG __ Affected\n\nUpdated: August 28, 2003 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nPlease see the vendor statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) at:\n\n<http://www.openpkg.org/security/OpenPKG-SA-2003.037-sendmail.html>\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nText of statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) follows: \n \n`-----BEGIN PGP SIGNED MESSAGE----- \nHash: SHA1 \n` \n`________________________________________________________________________ \n` \n`OpenPKG Security Advisory The OpenPKG Project \n``<http://www.openpkg.org/security.html>`` ``<http://www.openpkg.org>`` \nopenpkg-security@openpkg.org openpkg@openpkg.org \nOpenPKG-SA-2003.037 28-Aug-2003 \n________________________________________________________________________ \n` \n`Package: sendmail \nVulnerability: Denial of Service \nOpenPKG Specific: no \n` \n`Affected Releases: Affected Packages: Corrected Packages: \nOpenPKG CURRENT none N.A. \nOpenPKG 1.3 none N.A. \nOpenPKG 1.2 <= sendmail-8.12.7-1.2.2 >= sendmail-8.12.7-1.2.3 \n` \n`Dependent Packages: none \n` \n`Description: \nOleg Bulyzhin reported to FreeBSD [1] a confirmed [2] Denial of \nService (DoS) vulnerability in all version of the Sendmail MTA [0] \nearlier than 8.12.9. Due to a wrong initialization of an internal \nstructure, if Sendmail gets a bad DNS reply (with actual reply size \nnot equal the announced reply size), it later calls free() on a random \naddress. This usually cause Sendmail to crash.` \n \n`Please check whether you are affected by running \"<prefix>/bin/rpm \n-q sendmail\". If you have the \"sendmail\" package installed and its \nversion is affected (see above), we recommend that you immediately \nupgrade it (see Solution). [3][4]` \n \n`Solution: \nSelect the updated source RPM appropriate for your OpenPKG release \n[5], fetch it from the OpenPKG FTP service [6] or a mirror location, \nverify its integrity [7], build a corresponding binary RPM from it [3] \nand update your OpenPKG installation by applying the binary RPM [4]. \nFor the affected release OpenPKG 1.2, perform the following operations \nto permanently fix the security problem (for other releases adjust \naccordingly).` \n \n`$ ftp ftp.openpkg.org \nftp> bin \nftp> cd release/1.2/UPD \nftp> get sendmail-8.12.7-1.2.3.src.rpm \nftp> bye \n$ <prefix>/bin/rpm -v --checksig sendmail-8.12.7-1.2.3.src.rpm \n$ <prefix>/bin/rpm --rebuild sendmail-8.12.7-1.2.3.src.rpm \n$ su - \n# <prefix>/bin/rpm -Fvh <prefix>/RPM/PKG/sendmail-8.12.7-1.2.3.*.rpm` \n`________________________________________________________________________ \n` \n`References: \n[0] ``<http://www.sendmail.org/>`` \n[1] ``<http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/54367>`` \n[2] ``<http://www.sendmail.org/dnsmap1.html>`` \n[3] ``<http://www.openpkg.org/tutorial.html#regular-source>`` \n[4] ``<http://www.openpkg.org/tutorial.html#regular-binary>`` \n[5] ``<ftp://ftp.openpkg.org/release/1.2/UPD/sendmail-8.12.7-1.2.3.src.rpm>`` \n[6] ``<ftp://ftp.openpkg.org/release/1.2/UPD/>`` \n[7] ``<http://www.openpkg.org/security.html#signature>` \n`________________________________________________________________________ \n` \n`For security reasons, this advisory was digitally signed with the \nOpenPGP public key \"OpenPKG <openpkg@openpkg.org>\" (ID 63C4CB9F) of the \nOpenPKG project which you can retrieve from ``<http://pgp.openpkg.org>`` and \nhkp://pgp.openpkg.org. Follow the instructions on ``<http://pgp.openpkg.org/>`` \nfor details on how to verify the integrity of this advisory. \n________________________________________________________________________ \n` \n`-----BEGIN PGP SIGNATURE----- \nComment: OpenPKG <openpkg@openpkg.org> \n` \n`iD8DBQE/Tb+ZgHWT4GPEy58RAsYCAJ9ZCxyvh1cHAc3yodParNpttFQlCQCg3Esl \naNgXgF5F2UNtdcjd8JUblII= \n=Yd9K \n-----END PGP SIGNATURE----- \n`\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23993452 Feedback>).\n\n### SGI __ Affected\n\nUpdated: August 25, 2003 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nPlease see the vendor statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) at:\n\n<ftp://patches.sgi.com/support/free/security/advisories/20030803-01-P>\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nText of statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) follows: \n`-----BEGIN PGP SIGNED MESSAGE-----` \n \n`______________________________________________________________________________` \n` SGI Security Advisory` \n \n` Title : Sendmail DNS Map Vulnerability` \n` Number : 20030803-01-P` \n` Date : August 25, 2003` \n` Reference: CVE CAN-2003-0688` \n` Reference: SGI BUG 898396` \n` Fixed in : IRIX 6.5.22 or patch 5287` \n`______________________________________________________________________________` \n \n`SGI provides this information freely to the SGI user community for its` \n`consideration, interpretation, implementation and use. SGI recommends that` \n`this information be acted upon as soon as possible.` \n \n`SGI provides the information in this Security Advisory on an \"AS-IS\" basis` \n`only, and disclaims all warranties with respect thereto, express, implied` \n`or otherwise, including, without limitation, any warranty of merchantability` \n`or fitness for a particular purpose. In no event shall SGI be liable for` \n`any loss of profits, loss of business, loss of data or for any indirect,` \n`special, exemplary, incidental or consequential damages of any kind arising` \n`from your use of, failure to use or improper use of any of the instructions` \n`or information in this Security Advisory.` \n`______________________________________________________________________________` \n \n`- -----------------------` \n`- --- Issue Specifics ---` \n`- -----------------------` \n \n`It's been reported by sendmail.org that there is a potential problem in the` \n`sendmail 8.12 series with respect to DNS maps in sendmail 8.12.8 and earlier` \n`sendmail 8.12.x versions: <http://www.sendmail.org/dnsmap1.html>` \n \n`SGI ships sendmail 8.12.5 with IRIX 6.5.19 and later. The bug did not exist` \n`in versions before 8.12 as the DNS map type is new to 8.12.x versions.` \n`This bug could potentially be exploited to cause a Denial of Service.` \n`There may be a possibility of using it to gain remote root access.` \n \n`The Common Vulnerabilities and Exposures project (cve.mitre.org) has` \n`assigned the name CAN-2003-0688 to this issue:` \n`<http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0688>` \n \n`SGI has investigated the issue and recommends the following steps for` \n`neutralizing the exposure. It is HIGHLY RECOMMENDED that these measures be` \n`implemented on ALL vulnerable SGI systems.` \n \n`These issues have been corrected in patches and in future releases of IRIX.` \n \n \n`- --------------` \n`- --- Impact ---` \n`- --------------` \n \n`The sendmail binary is installed by default on IRIX 6.5 systems as part of` \n`eoe.sw.base.` \n \n`To determine the version of IRIX you are running, execute the following` \n`command:` \n \n` # /bin/uname -R` \n \n`That will return a result similar to the following:` \n \n` # 6.5 6.5.19f` \n \n`The first number (\"6.5\") is the release name, the second (\"6.5.16f\" in this` \n`case) is the extended release name. The extended release name is the` \n`\"version\" we refer to throughout this document.` \n \n \n`- ----------------------------` \n`- --- Temporary Workaround ---` \n`- ----------------------------` \n \n`There is no effective workaround available for these problems if you use dns` \n`maps with sendmail. SGI recommends either upgrading to IRIX 6.5.22 (when` \n`available), or installing the appropriate patch from the listing below.` \n \n \n`- ----------------` \n`- --- Solution ---` \n`- ----------------` \n \n`SGI has provided a series of patches for these vulnerabilities. Our` \n`recommendation is to upgrade to IRIX 6.5.22 (when available), or install the` \n`appropriate patch.` \n \n` OS Version Vulnerable? Patch # Other Actions` \n` ---------- ----------- ------- -------------` \n` IRIX 3.x unknown Note 1` \n` IRIX 4.x unknown Note 1` \n` IRIX 5.x unknown Note 1` \n` IRIX 6.0.x unknown Note 1` \n` IRIX 6.1 unknown Note 1` \n` IRIX 6.2 unknown Note 1` \n` IRIX 6.3 unknown Note 1` \n` IRIX 6.4 unknown Note 1` \n` IRIX 6.5 no` \n` IRIX 6.5.1 no` \n` IRIX 6.5.2 no` \n` IRIX 6.5.3 no` \n` IRIX 6.5.4 no` \n` IRIX 6.5.5 no` \n` IRIX 6.5.6 no` \n` IRIX 6.5.7 no` \n` IRIX 6.5.8 no` \n` IRIX 6.5.9 no` \n` IRIX 6.5.10 no` \n` IRIX 6.5.11 no` \n` IRIX 6.5.12 no` \n` IRIX 6.5.13 no` \n` IRIX 6.5.14 no` \n` IRIX 6.5.15 no` \n` IRIX 6.5.16 no` \n` IRIX 6.5.17 no` \n` IRIX 6.5.18 no` \n` IRIX 6.5.19 yes 5287 Notes 2 & 3` \n` IRIX 6.5.20 yes 5287 Notes 2 & 3` \n` IRIX 6.5.21 yes 5287 Notes 2 & 3` \n` IRIX 6.5.22 no` \n \n` NOTES` \n \n` 1) This version of the IRIX operating has been retired. Upgrade to an` \n` actively supported IRIX operating system. See` \n` <http://support.sgi.com> for more information.` \n \n` 2) If you have not received an IRIX 6.5.X CD for IRIX 6.5, contact your` \n` SGI Support Provider or URL: <http://support.sgi.com>` \n \n` 3) Upgrade to IRIX 6.5.22 (when available) or install the patch.` \n \n` ##### Patch File Checksums ####` \n`Filename: README.patch.5287` \n`Algorithm #1 (sum -r): 03461 10 README.patch.5287` \n`Algorithm #2 (sum): 38994 10 README.patch.5287` \n`MD5 checksum: 727E74B176D101AA4DE1E5F816E86AF2` \n \n`Filename: patchSG0005287` \n`Algorithm #1 (sum -r): 39412 4 patchSG0005287` \n`Algorithm #2 (sum): 5197 4 patchSG0005287` \n`MD5 checksum: 6A69EEF8FC02D549D110A64F8DEDA98C` \n \n`Filename: patchSG0005287.eoe_src` \n`Algorithm #1 (sum -r): 18481 378 patchSG0005287.eoe_src` \n`Algorithm #2 (sum): 2432 378 patchSG0005287.eoe_src` \n`MD5 checksum: EBDE27E3AF773E0EA6D2884A88501B71` \n \n`Filename: patchSG0005287.eoe_sw` \n`Algorithm #1 (sum -r): 34932 1104 patchSG0005287.eoe_sw` \n`Algorithm #2 (sum): 48296 1104 patchSG0005287.eoe_sw` \n`MD5 checksum: 0DE3B5C3BE9FE1DE0E0F022BB2FCDF14` \n \n`Filename: patchSG0005287.idb` \n`Algorithm #1 (sum -r): 56703 4 patchSG0005287.idb` \n`Algorithm #2 (sum): 23907 4 patchSG0005287.idb` \n`MD5 checksum: 6A25934457046F7EDFD84A9CE39C9623` \n \n \n`- ------------------------` \n`- --- Acknowledgments ----` \n`- ------------------------` \n \n`SGI wishes to thank sendmail.org and the users of the Internet Community at` \n`large for their assistance in this matter.` \n \n \n`- -------------` \n`- --- Links ---` \n`- -------------` \n \n`SGI Security Advisories can be found at:` \n`<http://www.sgi.com/support/security/> and` \n`<ftp://patches.sgi.com/support/free/security/advisories/>` \n \n`SGI Security Patches can be found at:` \n`<http://www.sgi.com/support/security/> and` \n`<ftp://patches.sgi.com/support/free/security/patches/>` \n \n`SGI patches for IRIX can be found at the following patch servers:` \n`<http://support.sgi.com/> and <ftp://patches.sgi.com/>` \n \n`SGI freeware updates for IRIX can be found at:` \n`<http://freeware.sgi.com/>` \n \n`SGI patches and RPMs for Linux can be found at:` \n`<http://support.sgi.com>` \n \n`SGI patches for Windows NT or 2000 can be found at:` \n`<http://support.sgi.com/>` \n \n`IRIX 5.2-6.4 Recommended/Required Patch Sets can be found at:` \n`<http://support.sgi.com/> and <ftp://patches.sgi.com/support/patchset/>` \n \n`IRIX 6.5 Maintenance Release Streams can be found at:` \n`<http://support.sgi.com/>` \n \n`IRIX 6.5 Software Update CDs can be obtained from:` \n`<http://support.sgi.com/>` \n \n`The primary SGI anonymous FTP site for security advisories and patches is` \n`patches.sgi.com. Security advisories and patches are located under the URL` \n`<ftp://patches.sgi.com/support/free/security/>` \n \n`For security and patch management reasons, ftp.sgi.com (mirrors` \n`patches.sgi.com security FTP repository) lags behind and does not do a` \n`real-time update.` \n \n \n`- -----------------------------------------` \n`- --- SGI Security Information/Contacts ---` \n`- -----------------------------------------` \n \n`If there are questions about this document, email can be sent to` \n`security-info@sgi.com.` \n \n` ------oOo------` \n \n`SGI provides security information and patches for use by the entire SGI` \n`community. This information is freely available to any person needing the` \n`information and is available via anonymous FTP and the Web.` \n \n`The primary SGI anonymous FTP site for security advisories and patches is` \n`patches.sgi.com. Security advisories and patches are located under the URL` \n`<ftp://patches.sgi.com/support/free/security/>` \n \n`The SGI Security Headquarters Web page is accessible at the URL:` \n`<http://www.sgi.com/support/security/>` \n \n`For issues with the patches on the FTP sites, email can be sent to` \n`security-info@sgi.com.` \n \n`For assistance obtaining or working with security patches, please` \n`contact your SGI support provider.` \n \n` ------oOo------` \n \n`SGI provides a free security mailing list service called wiretap and` \n`encourages interested parties to self-subscribe to receive (via email) all` \n`SGI Security Advisories when they are released. Subscribing to the mailing` \n`list can be done via the Web` \n`(<http://www.sgi.com/support/security/wiretap.html>) or by sending email to` \n`SGI as outlined below.` \n \n`% mail wiretap-request@sgi.com` \n`subscribe wiretap <YourEmailAddress such as aaanalyst@sgi.com >` \n`end` \n`^d` \n \n`In the example above, <YourEmailAddress> is the email address that you wish` \n`the mailing list information sent to. The word end must be on a separate` \n`line to indicate the end of the body of the message. The control-d (^d) is` \n`used to indicate to the mail program that you are finished composing the` \n`mail message.` \n \n \n` ------oOo------` \n \n`SGI provides a comprehensive customer World Wide Web site. This site is` \n`located at <http://www.sgi.com/support/security/> .` \n \n` ------oOo------` \n \n`If there are general security questions on SGI systems, email can be sent to` \n`security-info@sgi.com.` \n \n`For reporting *NEW* SGI security issues, email can be sent to` \n`security-alert@sgi.com or contact your SGI support provider. A support` \n`contract is not required for submitting a security report.` \n \n`______________________________________________________________________________` \n` This information is provided freely to all interested parties` \n` and may be redistributed provided that it is not altered in any` \n` way, SGI is appropriately credited and the document retains and` \n` includes its valid PGP signature.` \n \n`-----BEGIN PGP SIGNATURE-----` \n`Version: 2.6.2` \n \n`iQCVAwUBP0pB9LQ4cFApAP75AQEdGAQAtNrjF2RpajRyZOeqzSweDnqUgculBEWk` \n`DxJej7wn7fLK2u4xWe+plD5TSvZj+9sr6VCI2fZe25bIddmlfy9tp+YNETr9W4/D` \n`BMcRd7IBLjLfESHbeupWJGsAWFki3Xw3oOVYgQQigKTk/wCS3fnjAgFNdA1rjnzl` \n`LOAuTzP+Wro=` \n`=S118` \n`-----END PGP SIGNATURE-----`\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23993452 Feedback>).\n\n### Sendmail __ Affected\n\nUpdated: August 25, 2003 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nPlease see the vendor statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) at:\n\n<http://www.sendmail.org/dnsmap1.html>\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nText of statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) follows: \n \n**DNS map problem in 8.12.x before 8.12.9**\n\nThere is a potential problem in sendmail 8.12.8 and earlier sendmail 8.12.x versions with respect to DNS maps. The bug did not exist in versions before 8.12 as the DNS map type is new to 8.12. The bug was fixed in 8.12.9, released March 29, 2003 but not labeled as a security fix as it wasn't believed to be a security bug: \n\nProperly initialize data structure for dns maps to avoid various \nerrors, e.g., looping processes. Problem noted by \nMaurice Makaay of InterNLnet B.V. \n\n\nNote that only FEATURE(`enhdnsbl') uses a DNS map. We do not have an assessment whether this problem is exploitable, however, if you use a DNS map and an 8.12 version older than 8.12.9, then either upgrade (strongly recommended) or apply the trivial patch given below. \n\nThis problem has been [_reported to FreeBSD_](<http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/54367>) by Oleg Bulyzhin, see \n\nHere's a quote from the [_report_](<http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/54367>): \n\nFix \n \nUse sm_resolve.c coming with sendmail 8.12.9 or use this [_patch_](<http://www.sendmail.org/sm_resolve.c.p1>): \n \n\\--- sm_resolve.c.orig Fri Jun 28 00:43:24 2002 \n+++ sm_resolve.c Thu Jul 10 01:21:17 2003 \n@@ -233,6 +233,7 @@ \ndns_free_data(r); \nreturn NULL; \n} \n\\+ memset(*rr, 0, sizeof(**rr)); \n(*rr)->rr_domain = sm_strdup(host); \nif ((*rr)->rr_domain == NULL) \n{ \n \n\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23993452 Feedback>).\n\n### SuSE Inc. __ Affected\n\nUpdated: August 26, 2003 \n\n### Status\n\nAffected\n\n### Vendor Statement\n\nPlease see the vendor statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) at:\n\n<http://www.suse.com/de/security/>\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nText of statement for [VU#993452](<http://www.kb.cert.org/vuls/id/993452>) follows: \n`-----BEGIN PGP SIGNED MESSAGE----- \n` \n`______________________________________________________________________________ \n` \n`SuSE Security Announcement \n` \n`Package: sendmail \nAnnouncement-ID: SuSE-SA:2003:035 \nDate: Tuesday, Aug 26th 2003 19:00 MEST \nAffected products: 8.0, 8.1, 8.2` \n`SuSE Linux Enterprise Server 8 \nremote denial-of-service` \n`Severity (1-10): 5 \nSuSE default package: no \nCross References: CAN-2003-0688` \n \n`Content of this advisory: \n1) security vulnerability resolved: calling free() with arbitrary` \n`argument \nproblem description, discussion, solution and upgrade information` \n`2) pending vulnerabilities, solutions, workarounds: \n- traceroute(-nanog) \n- gdm2 \n- pam_smb \n- exim` \n`3) standard appendix (further information) \n` \n`______________________________________________________________________________ \n` \n`1) problem description, brief discussion, solution, upgrade information \n` \n`The well known and widely used MTA sendmail is vulnerable to a \nremote denial-of-service attack in version 8.12.8 and earlier (but not \nbefore 8.12). The bug exists in the DNS map code. This feature is \nenabled by specifying FEATURE(`enhdnsbl'). \nWhen sendmail receives an invalid DNS response it tries to call free(3) \non random data which results in a process crash.` \n \n`After your system was updated you have to restart your sendmail daemon \nto make the update effective.` \n \n`There is no known workaround for this vulnerability other than using a \ndifferent MTA.` \n \n`Please download the update package for your distribution and verify its \nintegrity by the methods listed in section 3) of this announcement. \nThen, install the package using the command \"rpm -Fhv file.rpm\" to apply \nthe update. \nOur maintenance customers are being notified individually. The packages \nare being offered to install from the maintenance web.` \n \n \n`Intel i386 Platform: \n` \n`SuSE-8.2: \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/sendmail-8.12.7-73.i586.rpm>` \n`eaf90e49886f496b2779107f1d9a831a \npatch rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/sendmail-8.12.7-73.i586.patch.rpm>` \n`c5999fe4026e05c4308249a7e3dbf8f4 \nsource rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/sendmail-8.12.7-73.src.rpm>` \n`2cda6c535a3be4e26c50373bd078b4c7 \n` \n`SuSE-8.1: \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/sendmail-8.12.6-147.i586.rpm>` \n`03d2b6e1083f863dc19a28f44256b071 \npatch rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/sendmail-8.12.6-147.i586.patch.rpm>` \n`ee6a3553396432bd3a208d355dacdd33 \nsource rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/sendmail-8.12.6-147.src.rpm>` \n`97417cee623251c6cc3009c13c5b1fbe \n` \n`SuSE-8.0: \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.0/n1/sendmail-8.12.3-76.i386.rpm>` \n`c7cd791bdbcf0c5ed80cd9aab0ccc965 \npatch rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.0/n1/sendmail-8.12.3-76.i386.patch.rpm>` \n`a2d04f73894a09b9134f0f516c385d78 \nsource rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/sendmail-8.12.3-76.src.rpm>` \n`4c059b5714ba2dbe5860654622b65bfb \n` \n \n`Intel i386 Platform: \n` \n`SuSE-8.2: \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/uucp-1.06.1-931.i586.rpm>` \n`1d5e50aea21f2ce88277fd9113dfb6da \npatch rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/i586/uucp-1.06.1-931.i586.patch.rpm>` \n`402cff9f2e0e4b56b2409082d0adbc0d \nsource rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.2/rpm/src/sendmail-8.12.7-73.src.rpm>` \n`2cda6c535a3be4e26c50373bd078b4c7 \n` \n`SuSE-8.1: \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/uucp-1.06.1-931.i586.rpm>` \n`7de06e8f16800359e25b5d9dcc739af5 \npatch rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/i586/uucp-1.06.1-931.i586.patch.rpm>` \n`67c84d8cd4ff132ef0c1a91ed845b5d8 \nsource rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.1/rpm/src/sendmail-8.12.6-147.src.rpm>` \n`97417cee623251c6cc3009c13c5b1fbe \n` \n`SuSE-8.0: \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/uucp-1.06.1-931.i386.rpm>` \n`b95b64d0c474ee7b37a82e2fc04e72b7 \npatch rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.0/n4/uucp-1.06.1-931.i386.patch.rpm>` \n`e872341553634848bb19b0d89a1e3a37 \nsource rpm(s): \n``<ftp://ftp.suse.com/pub/suse/i386/update/8.0/zq1/sendmail-8.12.3-76.src.rpm>` \n`4c059b5714ba2dbe5860654622b65bfb \n` \n`______________________________________________________________________________ \n` \n`2) Pending vulnerabilities in SuSE Distributions and Workarounds: \n` \n`- traceroute(-nanog) \nA integer overflow in traceroute can be abused by local attackers \nto gain access to a raw IP socket. \nNew packages are available on out FTP servers.` \n \n`- gdm2 \nDue to a bug in GDM it is possible for local users to read any text \nfile on a system by creating a symlink from ~/.xsession-errors. \nUpdated packages will be available on our FTP servers soon.` \n \n`- pam_smb \nA buffer overflow in the password handling function of pam_smb \nallows remote root compromise. \nFixed packages will be available soon.` \n \n`- exim \nTwo bugs where fixed in exim. One bug allows remote access as user \nmail/mail and the other one allows local root access for 'Admin Users'. \nFixed packages are available on our FTP servers.` \n \n`______________________________________________________________________________ \n` \n`3) standard appendix: authenticity verification, additional information \n` \n`- Package authenticity verification: \n` \n`SuSE update packages are available on many mirror ftp servers all over \nthe world. While this service is being considered valuable and important \nto the free and open source software community, many users wish to be \nsure about the origin of the package and its content before installing \nthe package. There are two verification methods that can be used \nindependently from each other to prove the authenticity of a downloaded \nfile or rpm package: \n1) md5sums as provided in the (cryptographically signed) announcement. \n2) using the internal gpg signatures of the rpm package.` \n \n`1) execute the command \nmd5sum <name-of-the-file.rpm>` \n`after you downloaded the file from a SuSE ftp server or its mirrors. \nThen, compare the resulting md5sum with the one that is listed in the \nannouncement. Since the announcement containing the checksums is \ncryptographically signed (usually using the key security@suse.de), \nthe checksums show proof of the authenticity of the package. \nWe disrecommend to subscribe to security lists which cause the \nemail message containing the announcement to be modified so that \nthe signature does not match after transport through the mailing \nlist software. \nDownsides: You must be able to verify the authenticity of the \nannouncement in the first place. If RPM packages are being rebuilt \nand a new version of a package is published on the ftp server, all \nmd5 sums for the files are useless.` \n \n`2) rpm package signatures provide an easy way to verify the authenticity \nof an rpm package. Use the command` \n`rpm -v --checksig <file.rpm> \nto verify the signature of the package, where <file.rpm> is the \nfilename of the rpm package that you have downloaded. Of course, \npackage authenticity verification can only target an un-installed rpm \npackage file. \nPrerequisites:` \n`a) gpg is installed \nb) The package is signed using a certain key. The public part of this` \n`key must be installed by the gpg program in the directory \n~/.gnupg/ under the user's home directory who performs the \nsignature verification (usually root). You can import the key \nthat is used by SuSE in rpm packages for SuSE Linux by saving \nthis announcement to a file (\"announcement.txt\") and \nrunning the command (do \"su -\" to be root):` \n`gpg --batch; gpg < announcement.txt | gpg --import \nSuSE Linux distributions version 7.1 and thereafter install the \nkey \"build@suse.de\" upon installation or upgrade, provided that \nthe package gpg is installed. The file containing the public key \nis placed at the top-level directory of the first CD (pubring.gpg) \nand at ``<ftp://ftp.suse.com/pub/suse/pubring.gpg-build.suse.de>`` .` \n \n \n`- SuSE runs two security mailing lists to which any interested party may \nsubscribe:` \n \n`suse-security@suse.com \n- general/linux/SuSE security discussion.` \n`All SuSE security announcements are sent to this list. \nTo subscribe, send an email to` \n`<suse-security-subscribe@suse.com>. \n` \n`suse-security-announce@suse.com \n- SuSE's announce-only mailing list.` \n`Only SuSE's security announcements are sent to this list. \nTo subscribe, send an email to` \n`<suse-security-announce-subscribe@suse.com>. \n` \n`For general information or the frequently asked questions (faq) \nsend mail to:` \n`<suse-security-info@suse.com> or \n<suse-security-faq@suse.com> respectively.` \n \n`===================================================================== \nSuSE's security contact is <security@suse.com> or <security@suse.de>. \nThe <security@suse.de> public key is listed below. \n=====================================================================` \n`______________________________________________________________________________ \n` \n`The information in this advisory may be distributed or reproduced, \nprovided that the advisory is not modified in any way. In particular, \nit is desired that the clear-text signature shows proof of the \nauthenticity of the text. \nSuSE Linux AG makes no warranties of any kind whatsoever with respect \nto the information contained in this security advisory.` \n \n`Type Bits/KeyID Date User ID \npub 2048R/3D25D3D9 1999-03-06 SuSE Security Team <security@suse.de> \npub 1024D/9C800ACA 2000-10-19 SuSE Package Signing Key <build@suse.de> \n` \n`- -----BEGIN PGP PUBLIC KEY BLOCK----- \nVersion: GnuPG v1.0.6 (GNU/Linux) \nComment: For info see ``<http://www.gnupg.org>`` \n` \n`mQGiBDnu9IERBACT8Y35+2vv4MGVKiLEMOl9GdST6MCkYS3yEKeueNWc+z/0Kvff \n4JctBsgs47tjmiI9sl0eHjm3gTR8rItXMN6sJEUHWzDP+Y0PFPboMvKx0FXl/A0d \nM+HFrruCgBlWt6FA+okRySQiliuI5phwqkXefl9AhkwR8xocQSVCFxcwvwCglVcO \nQliHu8jwRQHxlRE0tkwQQI0D+wfQwKdvhDplxHJ5nf7U8c/yE/vdvpN6lF0tmFrK \nXBUX+K7u4ifrZlQvj/81M4INjtXreqDiJtr99Rs6xa0ScZqITuZC4CWxJa9GynBE \nD3+D2t1V/f8l0smsuYoFOF7Ib49IkTdbtwAThlZp8bEhELBeGaPdNCcmfZ66rKUd \nG5sRA/9ovnc1krSQF2+sqB9/o7w5/q2qiyzwOSTnkjtBUVKn4zLUOf6aeBAoV6NM \nCC3Kj9aZHfA+ND0ehPaVGJgjaVNFhPi4x0e7BULdvgOoAqajLfvkURHAeSsxXIoE \nmyW/xC1sBbDkDUIBSx5oej73XCZgnj/inphRqGpsb+1nKFvF+rQoU3VTRSBQYWNr \nYWdlIFNpZ25pbmcgS2V5IDxidWlsZEBzdXNlLmRlPohcBBMRAgAcBQI57vSBBQkD \nwmcABAsKAwQDFQMCAxYCAQIXgAAKCRCoTtronIAKyl8sAJ98BgD40zw0GHJHIf6d \nNfnwI2PAsgCgjH1+PnYEl7TFjtZsqhezX7vZvYCIRgQQEQIABgUCOnBeUgAKCRCe \nQOMQAAqrpNzOAKCL512FZvv4VZx94TpbA9lxyoAejACeOO1HIbActAevk5MUBhNe \nLZa/qM2JARUDBRA6cGBvd7LmAD0l09kBATWnB/9An5vfiUUE1VQnt+T/EYklES3t \nXXaJJp9pHMa4fzFa8jPVtv5UBHGee3XoUNDVwM2OgSEISZxbzdXGnqIlcT08TzBU \nD9i579uifklLsnr35SJDZ6ram51/CWOnnaVhUzneOA9gTPSr+/fT3WeVnwJiQCQ3 \n0kNLWVXWATMnsnT486eAOlT6UNBPYQLpUprF5Yryk23pQUPAgJENDEqeU6iIO9Ot \n1ZPtB0lniw+/xCi13D360o1tZDYOp0hHHJN3D3EN8C1yPqZd5CvvznYvB6bWBIpW \ncRgdn2DUVMmpU661jwqGlRz1F84JG/xe4jGuzgpJt9IXSzyohEJB6XG5+D0BiF0E \nExECAB0FAjxqqTQFCQoAgrMFCwcKAwQDFQMCAxYCAQIXgAAKCRCoTtronIAKyp1f \nAJ9dR7saz2KPNwD3U+fy/0BDKXrYGACfbJ8fQcJqCBQxeHvt9yMPDVq0B0W5Ag0E \nOe70khAIAISR0E3ozF/la+oNaRwxHLrCet30NgnxRROYhPaJB/Tu1FQokn2/Qld/ \nHZnh3TwhBIw1FqrhWBJ7491iAjLR9uPbdWJrn+A7t8kSkPaF3Z/6kyc5a8fas44h \nt5h+6HMBzoFCMAq2aBHQRFRNp9Mz1ZvoXXcI1lk1l8OqcUM/ovXbDfPcXsUVeTPT \ntGzcAi2jVl9hl3iwJKkyv/RLmcusdsi8YunbvWGFAF5GaagYQo7YlF6UaBQnYJTM \n523AMgpPQtsKm9o/w9WdgXkgWhgkhZEeqUS3m5xNey1nLu9iMvq9M/iXnGz4sg6Q \n2Y+GqZ+yAvNWjRRou3zSE7Bzg28MI4sAAwYH/2D71Xc5HPDgu87WnBFgmp8MpSr8 \nQnSs0wwPg3xEullGEocolSb2c0ctuSyeVnCttJMzkukL9TqyF4s/6XRstWirSWaw \nJxRLKH6Zjo/FaKsshYKf8gBkAaddvpl3pO0gmUYbqmpQ3xDEYlhCeieXS5MkockQ \n1sj2xYdB1xO0ExzfiCiscUKjUFy+mdzUsUutafuZ+gbHog1CN/ccZCkxcBa5IFCH \nORrNjq9pYWlrxsEn6ApsG7JJbM2besW1PkdEoxak74z1senh36m5jQvVjA3U4xq1 \nwwylxadmmJaJHzeiLfb7G1ZRjZTsB7fyYxqDzMVul6o9BSwO/1XsIAnV1uuITAQY \nEQIADAUCOe70kgUJA8JnAAAKCRCoTtronIAKyksiAJsFB3/77SkH3JlYOGrEe1Ol \n0JdGwACeKTttgeVPFB+iGJdiwQlxasOfuXyITAQYEQIADAUCPGqpWQUJCgCCxwAK \nCRCoTtronIAKyofBAKCSZM2UFyta/fe9WgITK9I5hbxxtQCfX+0ar2CZmSknn3co \nSPihn1+OBNyZAQ0DNuEtBAAAAQgAoCRcd7SVZEFcumffyEwfLTcXQjhKzOahzxpo \nomuF+HIyU4AGq+SU8sTZ/1SsjhdzzrSAfv1lETACA+3SmLr5KV40Us1w0UC64cwt \nA46xowVq1vMlH2Lib+V/qr3b1hE67nMHjysECVx9Ob4gFuKNoR2eqnAaJvjnAT8J \n/LoUC20EdCHUqn6v+M9t/WZgC+WNR8cq69uDy3YQhDP/nIan6fm2uf2kSV9A7ZxE \nGrwsWl/WX5Q/sQqMWaU6r4az98X3z90/cN+eJJ3vwtA+rm+nxEvyev+jaLuOQBDf \nebh/XA4FZ35xmi+spdiVeJH4F/ubaGlmj7+wDOF3suYAPSXT2QAFEbQlU3VTRSBT \nZWN1cml0eSBUZWFtIDxzZWN1cml0eUBzdXNlLmRlPokBFQMFEDbhLUfkWLKHsco8 \nRQEBVw4H/1vIdiOLX/7hdzYaG9crQVIk3QwaB5eBbjvLEMvuCZHiY2COUg5QdmPQ \n8SlWNZ6k4nu1BLcv2g/pymPUWP9fG4tuSnlUJDrWGm3nhyhAC9iudP2u1YQY37Gb \nB6NPVaZiYMnEb4QYFcqv5c/r2ghSXUTYk7etd6SW6WCOpEqizhx1cqDKNZnsI/1X \n11pFcO2N7rc6byDBJ1T+cK+F1Ehan9XBt/shryJmv04nli5CXQMEbiqYYMOu8iaA \n8AWRgXPCWqhyGhcVD3LRhUJXjUOdH4ZiHCXaoF3zVPxpeGKEQY8iBrDeDyB3wHmj \nqY9WCX6cmogGQRgYG6yJqDalLqrDOdmJARUDBRA24S0Ed7LmAD0l09kBAW04B/4p \nWH3f1vQn3i6/+SmDjGzUu2GWGq6Fsdwo2hVM2ym6CILeow/K9JfhdwGvY8LRxWRL \nhn09j2IJ9P7H1Yz3qDf10AX6V7YILHtchKT1dcngCkTLmDgC4rs1iAAl3f089sRG \nBafGPGKv2DQjHfR1LfRtbf0P7c09Tkej1MP8HtQMW9hPkBYeXcwbCjdrVGFOzqx+ \nAvvJDdT6a+oyRMTFlvmZ83UV5pgoyimgjhWnM1V4bFBYjPrtWMkdXJSUXbR6Q7Pi \nRZWCzGRzwbaxqpl3rK/YTCphOLwEMB27B4/fcqtBzgoMOiaZA0M5fFoo54KgRIh0 \nzinsSx2OrWgvSiLEXXYKiEYEEBECAAYFAjseYcMACgkQnkDjEAAKq6ROVACgjhDM \n/3KM+iFjs5QXsnd4oFPOnbkAnjYGa1J3em+bmV2aiCdYXdOuGn4ZiQCVAwUQN7c7 \nwhaQN/7O/JIVAQEB+QP/cYblSAmPXxSFiaHWB+MiUNw8B6ozBLK0QcMQ2YcL6+Vl \nD+nSZP20+Ja2nfiKjnibCv5ss83yXoHkYk2Rsa8foz6Y7tHwuPiccvqnIC/c9Cvz \ndbIsdxpfsi0qWPfvX/jLMpXqqnPjdIZErgxpwujas1n9016PuXA8K3MJwVjCqSKI \nRgQQEQIABgUCOhpCpAAKCRDHUqoysN/3gCt7AJ9adNQMbmA1iSYcbhtgvx9ByLPI \nDgCfZ5Wj+f7cnYpFZI6GkAyyczG09sE= \n=LRKC \n- -----END PGP PUBLIC KEY BLOCK----- \n` \n`-----BEGIN PGP SIGNATURE----- \nVersion: GnuPG v1.0.7 (GNU/Linux) \n` \n`iQEVAwUBP0uSXXey5gA9JdPZAQGGcgf+J8TlOK/TFlb7EsPTxjaPsGkld6KCr2FY \n0ThLj7+LTW7UgQkt+3lV0gC0LUaABsd5J3+sXFkBTQ9/7C7DcAbtpT0ImjrfwssG \ndLyTMTa4j3fN96KWf6WA+TH4/96kb1uo1qoEZjunLdrRV4oY7yTFS2U6+6ltV1E3 \n08qalMCauHCRE9v3abuYtTN1QhxqYv1BtWdZej/5eGgu/uuKFiGwbqDfwL6TUzhL \nrYRUhfji7t88JxxH7HouZJlgB2RGh3QmVYLisdH3N3WGPzNhmeyhclSjJxPYrDGt \nKXHrn9+4DIn8nHZ+XxJ0oY8UdvMl26Wk4gwUgNDWM57/AdyiL+FyUA== \n=21Hz \n-----END PGP SIGNATURE----- \n` \n`Bye, \nThomas` \n`-- ` \n`Thomas Biege <thomas@suse.de> \nSuSE Linux AG,Deutschherrnstr. 15-19,90429 Nuernberg \nFunction: Security Support & Auditing \n\"lynx -source ``<http://www.suse.de/~thomas/contact/thomas.asc>`` | pgp -fka\" \nKey fingerprint = 51 AD B9 C7 34 FC F2 54 01 4A 1C D4 66 64 09 83` \n`-- \nfinding beauty in the dissonance` \n`- Maynard James Keenan \n`\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23993452 Feedback>).\n\n### Cray Inc. Unknown\n\nNotified: August 26, 2003 Updated: August 26, 2003 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nThe CERT/CC has no additional comments at this time.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23993452 Feedback>).\n\n### NetBSD Unknown\n\nUpdated: August 25, 2003 \n\n### Status\n\nUnknown\n\n### Vendor Statement\n\nWe have not received a statement from the vendor.\n\n### Vendor Information \n\nThe vendor has not provided us with any further information regarding this vulnerability.\n\n### Addendum\n\nThe CERT/CC has no additional comments at this time.\n\nIf you have feedback, comments, or additional information about this vulnerability, please send us [email](<mailto:cert@cert.org?Subject=VU%23993452 Feedback>).\n\n \n\n\n### CVSS Metrics \n\nGroup | Score | Vector \n---|---|--- \nBase | | \nTemporal | | \nEnvironmental | | \n \n \n\n\n### References \n\n * <http://www.sendmail.org/8.12.9.html>\n * <http://www.sendmail.org/dnsmap1.html>\n * <http://www.sendmail.org/~ca/email/doc8.12/cf/m4/features.html#enhdnsbl>\n * <http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/54367>\n\n### Acknowledgements\n\nOleg Bulyzhin has been credited to reporting this vulnerability to FreeBSD. The issue was also reported to Sendmail by Maurice Makaay.\n\nThis document was written by Jeffrey S. Havrilla.\n\n### Other Information\n\n**CVE IDs:** | [CVE-2003-0688](<http://web.nvd.nist.gov/vuln/detail/CVE-2003-0688>) \n---|--- \n**Severity Metric:** | 15.75 \n**Date Public:** | 2003-07-11 \n**Date First Published:** | 2003-08-25 \n**Date Last Updated: ** | 2003-12-30 22:33 UTC \n**Document Revision: ** | 15 \n", "modified": "2003-12-30T22:33:00", "published": "2003-08-25T00:00:00", "id": "VU:993452", "href": "https://www.kb.cert.org/vuls/id/993452", "type": "cert", "title": "Sendmail fails to appropriately initialize data structures for DNS maps", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}], "suse": [{"lastseen": "2016-09-04T12:02:22", "bulletinFamily": "unix", "cvelist": ["CVE-2003-0688"], "description": "The well known and widely used MTA sendmail is vulnerable to a remote denial-of-service attack in version 8.12.8 and earlier (but not before 8.12). The bug exists in the DNS map code. This feature is enabled by specifying FEATURE(`enhdnsbl'). When sendmail receives an invalid DNS response it tries to call free(3) on random data which results in a process crash.", "edition": 1, "modified": "2003-08-26T17:08:16", "published": "2003-08-26T17:08:16", "id": "SUSE-SA:2003:035", "href": "http://lists.opensuse.org/opensuse-security-announce/2003-08/msg00009.html", "type": "suse", "title": "remote denial-of-service in sendmail", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "securityvulns": [{"lastseen": "2018-08-31T11:10:08", "bulletinFamily": "software", "cvelist": ["CVE-2003-0688"], "description": "-----BEGIN PGP SIGNED MESSAGE-----\r\nHash: SHA1\r\n\r\n________________________________________________________________________\r\n\r\n Mandrake Linux Security Update Advisory\r\n________________________________________________________________________\r\n\r\nPackage name: sendmail\r\nAdvisory ID: MDKSA-2003:086\r\nDate: August 26th, 2003\r\n\r\nAffected versions: 8.2, 9.0, Corporate Server 2.1\r\n________________________________________________________________________\r\n\r\nProblem Description:\r\n\r\n A vulnerability was discovered in all 8.12.x versions of sendmail up to\r\n and including 8.12.8. Due to wrong initialization of RESOURCE_RECORD_T\r\n structures, if sendmail receives a bad DNS reply it will call free() on\r\n random addresses which usually causes sendmail to crash.\r\n \r\n These updated packages are patched to fix the problem.\r\n________________________________________________________________________\r\n\r\nReferences:\r\n \r\n http://cve.mitre.org/cgi-bin/cvename.cgi?name=CAN-2003-0688\r\n http://www.sendmail.org/dnsmap1.html\r\n http://www.freebsd.org/cgi/query-pr.cgi?pr=bin/54367\r\n________________________________________________________________________\r\n\r\nUpdated Packages:\r\n \r\n Corporate Server 2.1:\r\n 06f312efc82a853bef8f244f0a7d62b6 corporate/2.1/RPMS/sendmail-8.12.6-3.4mdk.i586.rpm\r\n 6159dd74781b4e12ba2d9cb8c74cebc5 corporate/2.1/RPMS/sendmail-cf-8.12.6-3.4mdk.i586.rpm\r\n 0947b751f4934fe29f32eb02670640ee corporate/2.1/RPMS/sendmail-devel-8.12.6-3.4mdk.i586.rpm\r\n 9b768e4a330cc0cd6cdebd1470953247 corporate/2.1/RPMS/sendmail-doc-8.12.6-3.4mdk.i586.rpm\r\n 8458487a8e2a69b3648896e342eb4c1a corporate/2.1/SRPMS/sendmail-8.12.6-3.4mdk.src.rpm\r\n\r\n Corporate Server 2.1/x86_64:\r\n 04d7ce56ad6b62339622ae6e030234ed x86_64/corporate/2.1/RPMS/sendmail-8.12.6-3.4mdk.x86_64.rpm\r\n 4b64a8056a3499e1d36ac1de72bc8c7e \r\nx86_64/corporate/2.1/RPMS/sendmail-cf-8.12.6-3.4mdk.x86_64.rpm\r\n 5e2ac30e590d3985c8de9ced5178d875 \r\nx86_64/corporate/2.1/RPMS/sendmail-devel-8.12.6-3.4mdk.x86_64.rpm\r\n aabddfe03a3a0fb88082c0311b318738 \r\nx86_64/corporate/2.1/RPMS/sendmail-doc-8.12.6-3.4mdk.x86_64.rpm\r\n 8458487a8e2a69b3648896e342eb4c1a x86_64/corporate/2.1/SRPMS/sendmail-8.12.6-3.4mdk.src.rpm\r\n\r\n Mandrake Linux 8.2:\r\n 2039013cc832600fe00c8c16f04e167f 8.2/RPMS/sendmail-8.12.1-4.4mdk.i586.rpm\r\n a628b53c10b173ad6b56ec818411e4a8 8.2/RPMS/sendmail-cf-8.12.1-4.4mdk.i586.rpm\r\n 41b1161434cab61b55bbda169949a980 8.2/RPMS/sendmail-devel-8.12.1-4.4mdk.i586.rpm\r\n d7d9e039cb3265ad955ce1401d97ca98 8.2/RPMS/sendmail-doc-8.12.1-4.4mdk.i586.rpm\r\n 7340654c00efcb2d64149cc946e1ea3b 8.2/SRPMS/sendmail-8.12.1-4.4mdk.src.rpm\r\n\r\n Mandrake Linux 8.2/PPC:\r\n 552617df801abbb743ea19f08efe9cd5 ppc/8.2/RPMS/sendmail-8.12.1-4.4mdk.ppc.rpm\r\n 634cf389d9b6d3782d52d6b4a9a06862 ppc/8.2/RPMS/sendmail-cf-8.12.1-4.4mdk.ppc.rpm\r\n 4e5fdd49f36c8263f9f8d4a5405beb27 ppc/8.2/RPMS/sendmail-devel-8.12.1-4.4mdk.ppc.rpm\r\n 320c1c788abf30b8fbafc6b6fff8ad6f ppc/8.2/RPMS/sendmail-doc-8.12.1-4.4mdk.ppc.rpm\r\n 7340654c00efcb2d64149cc946e1ea3b ppc/8.2/SRPMS/sendmail-8.12.1-4.4mdk.src.rpm\r\n\r\n Mandrake Linux 9.0:\r\n 06f312efc82a853bef8f244f0a7d62b6 9.0/RPMS/sendmail-8.12.6-3.4mdk.i586.rpm\r\n 6159dd74781b4e12ba2d9cb8c74cebc5 9.0/RPMS/sendmail-cf-8.12.6-3.4mdk.i586.rpm\r\n 0947b751f4934fe29f32eb02670640ee 9.0/RPMS/sendmail-devel-8.12.6-3.4mdk.i586.rpm\r\n 9b768e4a330cc0cd6cdebd1470953247 9.0/RPMS/sendmail-doc-8.12.6-3.4mdk.i586.rpm\r\n 8458487a8e2a69b3648896e342eb4c1a 9.0/SRPMS/sendmail-8.12.6-3.4mdk.src.rpm\r\n________________________________________________________________________\r\n\r\nBug IDs fixed (see https://qa.mandrakesoft.com for more information):\r\n________________________________________________________________________\r\n\r\nTo upgrade automatically, use MandrakeUpdate or urpmi. The verification\r\nof md5 checksums and GPG signatures is performed automatically for you.\r\n\r\nA list of FTP mirrors can be obtained from:\r\n\r\n http://www.mandrakesecure.net/en/ftp.php\r\n\r\nAll packages are signed by MandrakeSoft for security. You can obtain\r\nthe GPG public key of the Mandrake Linux Security Team by executing:\r\n\r\n gpg --recv-keys --keyserver www.mandrakesecure.net 0x22458A98\r\n\r\nPlease be aware that sometimes it takes the mirrors a few hours to\r\nupdate.\r\n\r\nYou can view other update advisories for Mandrake Linux at:\r\n\r\n http://www.mandrakesecure.net/en/advisories/\r\n\r\nMandrakeSoft has several security-related mailing list services that\r\nanyone can subscribe to. Information on these lists can be obtained by\r\nvisiting:\r\n\r\n http://www.mandrakesecure.net/en/mlist.php\r\n\r\nIf you want to report vulnerabilities, please contact\r\n\r\n security_linux-mandrake.com\r\n\r\nType Bits/KeyID Date User ID\r\npub 1024D/22458A98 2000-07-10 Linux Mandrake Security Team\r\n <security linux-mandrake.com>\r\n-----BEGIN PGP SIGNATURE-----\r\nVersion: GnuPG v1.0.7 (GNU/Linux)\r\n\r\niD8DBQE/SvSwmqjQ0CJFipgRAhRDAKCCv2FUoTaKeIqHsV5FABgCyOij3wCgl15/\r\n7Yqza+R5v0QER5DtbbryHPQ=\r\n=NmAc\r\n-----END PGP SIGNATURE-----\r\n\r\n_______________________________________________\r\nFull-Disclosure - We believe in it.\r\nCharter: http://lists.netsys.com/full-disclosure-charter.html", "edition": 1, "modified": "2003-08-26T00:00:00", "published": "2003-08-26T00:00:00", "id": "SECURITYVULNS:DOC:5025", "href": "https://vulners.com/securityvulns/SECURITYVULNS:DOC:5025", "title": "[Full-Disclosure] MDKSA-2003:086 - Updated sendmail packages fix vulnerability", "type": "securityvulns", "cvss": {"score": 5.0, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:PARTIAL/"}}], "nessus": [{"lastseen": "2021-01-01T06:02:05", "description": "The remote host is missing the patch for the advisory SUSE-SA:2003:035 (sendmail).\n\n\nThe well known and widely used MTA sendmail is vulnerable to a\nremote denial-of-service attack in version 8.12.8 and earlier (but not\nbefore 8.12). The bug exists in the DNS map code. This feature is\nenabled by specifying FEATURE(`enhdnsbl').\nWhen sendmail receives an invalid DNS response it tries to call free(3)\non random data which results in a process crash.\n\nAfter your system was updated you have to restart your sendmail daemon\nto make the update effective.\n\nThere is no known workaround for this vulnerability other than using a\ndifferent MTA.\n\nPlease download the update package for your distribution and verify its\nintegrity by the methods listed in section 3) of this announcement.\nThen, install the package using the command 'rpm -Fhv file.rpm' to apply\nthe update.", "edition": 22, "published": "2004-07-25T00:00:00", "title": "SUSE-SA:2003:035: sendmail", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2003-0688"], "modified": "2021-01-02T00:00:00", "cpe": [], "id": "SUSE_SA_2003_035.NASL", "href": "https://www.tenable.com/plugins/nessus/13803", "sourceData": "#%NASL_MIN_LEVEL 80502\n#\n# (C) Tenable Network Security, Inc.\n#\n# This plugin text was extracted from SuSE Security Advisory SUSE-SA:2003:035\n#\n\n\nif ( ! defined_func(\"bn_random\") ) exit(0);\n\ninclude(\"compat.inc\");\n\nif(description)\n{\n script_id(13803);\n script_bugtraq_id(8485);\n script_version (\"1.15\");\n script_cve_id(\"CVE-2003-0688\");\n \n name[\"english\"] = \"SUSE-SA:2003:035: sendmail\";\n \n script_name(english:name[\"english\"]);\n \n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote host is missing a vendor-supplied security patch\" );\n script_set_attribute(attribute:\"description\", value:\n\"The remote host is missing the patch for the advisory SUSE-SA:2003:035 (sendmail).\n\n\nThe well known and widely used MTA sendmail is vulnerable to a\nremote denial-of-service attack in version 8.12.8 and earlier (but not\nbefore 8.12). The bug exists in the DNS map code. This feature is\nenabled by specifying FEATURE(`enhdnsbl').\nWhen sendmail receives an invalid DNS response it tries to call free(3)\non random data which results in a process crash.\n\nAfter your system was updated you have to restart your sendmail daemon\nto make the update effective.\n\nThere is no known workaround for this vulnerability other than using a\ndifferent MTA.\n\nPlease download the update package for your distribution and verify its\nintegrity by the methods listed in section 3) of this announcement.\nThen, install the package using the command 'rpm -Fhv file.rpm' to apply\nthe update.\" );\n script_set_attribute(attribute:\"solution\", value:\n\"http://www.suse.de/security/2003_035_sendmail.html\" );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:P\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n\n\n\n script_set_attribute(attribute:\"plugin_publication_date\", value: \"2004/07/25\");\n script_cvs_date(\"Date: 2019/10/25 13:36:27\");\n script_end_attributes();\n\n \n summary[\"english\"] = \"Check for the version of the sendmail package\";\n script_summary(english:summary[\"english\"]);\n \n script_category(ACT_GATHER_INFO);\n \n script_copyright(english:\"This script is Copyright (C) 2004-2019 Tenable Network Security, Inc.\");\n family[\"english\"] = \"SuSE Local Security Checks\";\n script_family(english:family[\"english\"]);\n \n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/SuSE/rpm-list\");\n exit(0);\n}\n\ninclude(\"rpm.inc\");\nif ( rpm_check( reference:\"sendmail-8.12.3-76\", release:\"SUSE8.0\") )\n{\n security_warning(0);\n exit(0);\n}\nif ( rpm_check( reference:\"uucp-1.06.1-931\", release:\"SUSE8.0\") )\n{\n security_warning(0);\n exit(0);\n}\nif ( rpm_check( reference:\"sendmail-8.12.6-147\", release:\"SUSE8.1\") )\n{\n security_warning(0);\n exit(0);\n}\nif ( rpm_check( reference:\"uucp-1.06.1-931\", release:\"SUSE8.1\") )\n{\n security_warning(0);\n exit(0);\n}\nif ( rpm_check( reference:\"sendmail-8.12.7-73\", release:\"SUSE8.2\") )\n{\n security_warning(0);\n exit(0);\n}\nif ( rpm_check( reference:\"uucp-1.06.1-931\", release:\"SUSE8.2\") )\n{\n security_warning(0);\n exit(0);\n}\nif (rpm_exists(rpm:\"sendmail-\", release:\"SUSE8.0\")\n || rpm_exists(rpm:\"sendmail-\", release:\"SUSE8.1\")\n || rpm_exists(rpm:\"sendmail-\", release:\"SUSE8.2\") )\n{\n set_kb_item(name:\"CVE-2003-0688\", value:TRUE);\n}\n", "cvss": {"score": 5.0, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:P"}}]}