5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
7.4 High
AI Score
Confidence
Low
0.002 Low
EPSS
Percentile
54.7%
New sendmail packages are available for Slackware 15.0 and -current to
fix a security issue.
Here are the details from the Slackware 15.0 ChangeLog:
extra/sendmail/sendmail-8.18.1-i586-1_slack15.0.txz: Upgraded.
sendmail through 8.17.2 allows SMTP smuggling in certain configurations.
Remote attackers can use a published exploitation technique to inject e-mail
messages with a spoofed MAIL FROM address, allowing bypass of an SPF
protection mechanism. This occurs because sendmail supports <LF>.<CR><LF>
but some other popular e-mail servers do not. This is resolved in 8.18 and
later versions with ‘o’ in srv_features.
For more information, see:
https://vulners.com/cve/CVE-2023-51765
(* Security fix *)
extra/sendmail/sendmail-cf-8.18.1-noarch-1_slack15.0.txz: Upgraded.
Where to find the new packages:
Thanks to the friendly folks at the OSU Open Source Lab
(http://osuosl.org) for donating FTP and rsync hosting
to the Slackware project! :-)
Also see the “Get Slack” section on http://slackware.com for
additional mirror sites near you.
Updated packages for Slackware 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/extra/sendmail/sendmail-8.18.1-i586-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware-15.0/extra/sendmail/sendmail-cf-8.18.1-noarch-1_slack15.0.txz
Updated packages for Slackware x86_64 15.0:
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/extra/sendmail/sendmail-8.18.1-x86_64-1_slack15.0.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-15.0/extra/sendmail/sendmail-cf-8.18.1-noarch-1_slack15.0.txz
Updated packages for Slackware -current:
ftp://ftp.slackware.com/pub/slackware/slackware-current/extra/sendmail/sendmail-8.18.1-i586-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware-current/extra/sendmail/sendmail-cf-8.18.1-noarch-1.txz
Updated packages for Slackware x86_64 -current:
ftp://ftp.slackware.com/pub/slackware/slackware64-current/extra/sendmail/sendmail-8.18.1-x86_64-1.txz
ftp://ftp.slackware.com/pub/slackware/slackware64-current/extra/sendmail/sendmail-cf-8.18.1-noarch-1.txz
MD5 signatures:
Slackware 15.0 packages:
c3476bc08a89961b1bd85aa41fe0399e sendmail-8.18.1-i586-1_slack15.0.txz
da65abecc807b6af76f1f5f23545c426 sendmail-cf-8.18.1-noarch-1_slack15.0.txz
Slackware x86_64 15.0 packages:
bd5bb1d3ec4e26829eb59361ed1e46cb sendmail-8.18.1-x86_64-1_slack15.0.txz
716fb38618dc85bf5704fa33c1086d2b sendmail-cf-8.18.1-noarch-1_slack15.0.txz
Slackware -current packages:
e7b502527dfbc9050a4c78cdc266e408 sendmail-8.18.1-i586-1.txz
603bcf2ecc861ea275f002636c259c4c sendmail-cf-8.18.1-noarch-1.txz
Slackware x86_64 -current packages:
38c56928fa6feb1709c84405e60b6f72 sendmail-8.18.1-x86_64-1.txz
5fc24831c13249281202717e17e70bae sendmail-cf-8.18.1-noarch-1.txz
Installation instructions:
Upgrade the packages as root:
> upgradepkg sendmail-*.txz
Then, restart sendmail:
> sh /etc/rc.d/rc.sendmail restart
5.3 Medium
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
LOW
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
7.4 High
AI Score
Confidence
Low
0.002 Low
EPSS
Percentile
54.7%